A public repository for useful developments surrounding Windows Sandbox
Windows Sandbox allows users to run a lightweight desktop environment in a secure Hyper-V isolated container. It creates a disposable instance of Windows that enables the ability to run any win32 application you wish with a pristine configuration every time you start it. It allows you to do virtually whatever you want within an isolated desktop environment without requiring any cleanup after the fact. Whether it be testing an unknown application or performing large computational tasks with many temporary files, Windows Sandbox makes it easy to employ a dedicated environment for whatever task is at hand.
This repository is a dedicated space for useful developments surrounding Windows Sandbox. It is a mixture of utilities generated by both the Microsoft kernel team and the community of Windows Sandbox users. If you want to learn more about how Windows Sandbox works please go take a look at the MSDN documentation.
Want to get in contact with us? Feel free to reach out to us at [email protected] with any suggestions or questions.
▼ Check out the list of community Sandbox repositories below! ▼
| File/folder | Description | |-------------------|--------------------------------------------| |
Folding In Sandbox| Run the [email protected] Client in Windows Sandbox | |
CONTRIBUTING.md| Guidelines for contributing to this repository.|
Here is a list of great repositories made by the community - feel free to browse through them and contribute where you can!
|GUI Tools||Windows Sandbox Editor||Damien Van Robaeys||GUI for generating and managing Windows Sandbox. Blog post.|
|Run in Sandbox Context Menu||Damien Van Robaeys||Adds right-click context menus for running scripts, applications, and more in Windows Sandbox|
|Utilities||PyWinSandbox||Yiftach Karkason||Python library to create and control Windows Sandboxes with RPyC & Simple CLI Utilities.|
A host computer running Windows 10 Pro or Enterprise Insider build 18362 or newer is currently needed to run Windows Sandbox. In addition to this you must ensure that virtualization is enabled on your machine: - If you are using a physical machine, ensure virtualization capabilities are enabled in the BIOS. - If you are using a virtual machine, enable nested virtualization with this PowerShell cmdlet:
```Set-VMProcessor -VMName -ExposeVirtualizationExtensions $true```
NOTE: This repository is only for utilities to be used with Windows Sandbox. If you would like to submit feedback for Windows Sandbox itself, please go through our Feedback Portal.
This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.
When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.