Trust No Program

Common Feature Requests

The Feature Requests Forum has been a great source for ideas to improve Sandboxie. Over the years, people have suggested many of the features in Sandboxie that many people now find useful. Below is a summary of recurring suggestions and requests that have not yet been fully addressed (if at all), or that are not likely to be addressed.

Add support for Apple & Linux or Mobile OS Devices

Not likely: The architecture of these systems is very different from Windows NT (XP/7/8/8.1/10), which means that creating a version of Sandboxie for these systems is a large undertaking. You can run Sandboxie in a VM Environment (VMWare, VirtualBox, Boot Camp)

Add support for 64-bit Windows

Please see Windows Vista 64.

Anonymize the IP address for anonymous, secure, sandboxed browsing

This feature has nothing to do with Sandboxie. Please see Anonymizer on Wikipedia.

Bundle documentation with the installation

Feel free to download the online content for local browsing. Start with the All Pages index page.

Change the Sandboxie Control icons and background

No, these visual elements make up the Sandboxie brand.

Contain an entire Windows logon session in the sandbox

While this feature request has some merit, Sandboxie is designed for the use of regular and sandboxed programs side by side, and perfecting this design is the principle goal of Sandboxie development at this time.

Compare the sandboxed registry to the real one and show changes

Not likely. If you wish to analyze the file/registry effects of a sandboxed program, use a tool like Process Monitor.

Extend "Run Sandboxed" menu to include any program

Use the Add Shortcut Icons button to create a desktop shortcut to a sandboxed program.

Extract sandboxed installations of applications and apply outside the sandbox

Not likely: On the one hand, it is difficult to associate an application listed in the (sandboxed) Start Menu with the set of changes that comprise its installation, so it is impractical to merge a single installation. On the other hand, merging an entire sandbox may merge some undesired changes. Thus, the best approach is to simply re-install the desired application outside the supervision of Sandboxie.

Indicate Sandboxie version in the installer file, e.g., SandboxieInstall-3-20.exe

With many software download Web sites linking directly to the installer file, adding the version number would complicate these links. You can determine the version number by looking at the installer file in Windows Explorer.

Let programs change the system clock only within the sandbox

Not likely: The system has only one clock, which means Sandboxie would have to manage its own "psuedo-clocks".

Log program actions, file access and registry writes, and/or do behavior analysis on programs

Not likely: There are tools which excel at these tasks, but Sandboxie is not designed for that. Use the mix and match approach: Use an activity trace tool to analyze the behavior of a program running under the supervision of Sandboxie.

Merge sandboxes into the entire system "on the fly" (like "layers" in other virtualization products)

Not likely: Sandboxie is designed for the use of regular and sandboxed programs side by side, and as little interference as possible with programs that you have not selected to run sandboxed. "Layers," which apply to all programs in the system when enabled, contradict this design.

Open-source Sandboxie, today!

No, thanks.

Permit drag-and-drop between sandboxed and regular windows

Easier said that done, but this feature is certainly desired, and a secure implementation for it is being researched.

Securely wipe the contents of the sandbox

There are a number of third-party tools dedicated for this task, which implement a variety of methods to securely wipe data. You can plug these tools into Sandboxie, as described in Secure Delete Sandbox.

Another way to make sure deleted sandbox content cannot be analyzed is to encrypt the sandbox, as discussed below.

Encrypt the contents of the sandbox

Creating an encrypted container for the sandbox is outside the scope of Sandboxie.

You can use other solutions to achieve this goal: Move the sandbox to a TrueCrypt volume, or turn on Windows encryption for the sandbox folder (typically located at C:\SANDBOX).

Store sandbox in memory (RAM) to improve performance

Use RAM disk software to create a memory drive, then configure Sandboxie to store the sandbox on that drive.

Sandboxie is Copyright © 2004-2019 by Sandboxie Holdings, LLC.  All rights reserved. | Contact Author