This repository contains a collection of pre-configured Windows Sandbox environments for various use cases. Windows Sandbox is a lightweight virtual environment built into Windows 10/11 that allows you to run applications in an isolated, temporary desktop environment without affecting your main OS.
The repository is organized as follows:
.wsbfiles: Windows Sandbox configuration files for different use casessandScript/: Installation scripts for common applicationstemplate.wsb: Standardized template for creating new configurations
moreSecurity.wsb: High-security environment with networking disabledGPUSandboxFix.wsb: Configuration with GPU-related fixesunkownSoftware.wsb: Isolated environment for analyzing unknown software
.standardDev.wsb: Secure development environmentmalwareDev.wsb: Environment for malware analysis with workspace mapping
darkBrowser.wsb: TOR Browser environmentdefaultBrowser.wsb: Standard browsing environment
standardMovies.wsb: Media consumption environment
The sandScript/ directory contains utility scripts for installing common applications:
InstallTOR.cmd: Downloads and installs the latest Tor BrowserInstallVSCode.cmd: Downloads and installs the latest Visual Studio Code
- Windows 10 Pro/Enterprise/Education (version 1903 or later) or Windows 11
- Virtualization must be enabled in BIOS/UEFI
- At least 4GB RAM (8GB recommended)
- Administrator privileges
- Double-click any
.wsbfile to launch Windows Sandbox with that configuration
- Open Command Prompt or PowerShell as Administrator
- Navigate to the repository directory
- Execute:
Start-Process .\filename.wsb
All configurations follow these standardized elements:
- Memory: 4096 MB
- Network: Enabled/Disabled based on security requirements
- Clipboard: Enabled/Disabled based on security requirements
- Audio/Video Input: Disabled for security
- Printer Redirection: Disabled
- Protected Client: Enabled
- VGpu: Disabled (can be enabled if needed)
- Mapped Folders: Standardized path mapping to C:\Scripts
Use template.wsb as a starting point for creating your own configurations. The template includes comments explaining each configuration option.
- Keep networking disabled when not needed
- Disable clipboard redirection for high-security tasks
- Use read-only mappings when possible
- Regularly update the installation scripts
- Review configuration files before use
Feel free to submit pull requests for new configurations or improvements to existing ones.
This project is licensed under the MIT License.
- Windows Sandbox documentation: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-sandbox/
- .wsb Configuration file format: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-files