OptionsWindow 0 0 622 412 0 0 0 0 16777215 16777215 SandboxiePlus Options true QTabWidget::West 0 General Options 0 Box Options Sandboxed window border: Qt::AlignRight|Qt::AlignTrailing|Qt::AlignVCenter 1 10 1 px Width Qt::AlignLeading|Qt::AlignLeft|Qt::AlignVCenter 75 true Appearance Sandbox Indicator in title: Qt::AlignRight|Qt::AlignTrailing|Qt::AlignVCenter Qt::Vertical 20 40 75 true Protect the system from sandboxed processes General restrictions Block network files and folders, unless specifically opened. Drop rights from Administrators and Power Users groups Run Menu Browse You can configure custom entries for the sandbox run menu. true Name Command Line Remove Qt::Vertical 20 40 Add Command File Options Qt::Vertical 20 40 Copy file size limit: kilobytes Protect this sandbox from deletion or emptying Auto delete content when last sandboxed process terminates 75 true File Mrigration 75 16777215 Issue message 2102 when a file is too large 75 true Box Delete options Program Groups Add Group Add Program Remove Qt::Vertical 20 40 true Name You can group programs together and give them a group name. Program groups can be used with some of the settings instead of program names. true Forced Programs 9 9 9 9 Remove Force Folder true Type Path Force Program Qt::Vertical 20 40 Show Templates Programs enteres here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in an otehr sandbox. true Stop Behavioure Remove Progam Qt::Vertical 20 40 Add Leader Program Add Lingering Program true Type Path Show Templates Lingering programs will be automatically terminated is thay are still running after all other processes have terminated. If leader processes are defined all others are threated as lingering processes. true Start Restrictions true Name Qt::Vertical 20 40 Remove Program Issue message 1308 when a program fails to start Add Program 0 Allow only sellected programs to start in this sandbox. * Prevent sellected programs from starting in this sandbox. Allow all programs to start in this sandbox. * Note: Programs installed to this sandbox wont be able to start at all. true Internet Restrictions Issue message 1307 when a program is denied internet access Block internet access for all programs except those added to the list. true Name Note: Programs installed to this sandbox wont be able access the internet at all. Remove Program Add Program Qt::Vertical 20 40 Prompt user whether to allow an exemption from the blockade. Resource Access true Type Program Access Path Add Reg Key Add File/Folder Remove Add Wnd Class Add COM Object Add IPC Path Qt::Vertical 20 40 Move Up Move Down Qt::Vertical 20 40 Show Templates Configure which processes can access what resources. Double click on an entry to edit it. 'Direct' File and Key access only applies to program binaries located outside the sandbox. Note that all Close...=!<program>,... excludes have the same limitations. For files access you can use 'Direct All' instead to make it apply to all programs. File Recovery Qt::Vertical 20 40 Add Folder Ignore Extension Ignore Folder Show Templates Enable Immediate Recovery prompt to be able to recover files as soon as thay are created. Qt::Vertical QSizePolicy::Preferred 20 40 Type Name Remove You can exclude folders and file types (or file extensions) from Immediate Recovery. true When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. true Advanced Options 50 false 0 50 false Miscellaneous Don't alter window class names created by sandboxed programs 75 true Protect the system from sandboxed processes Other restrictions 75 true Compatybility Limit access to the emulated service controll manager to privileged processes 75 true Protect the sandbox integrity itself Sandbox protection Force usage of custom dummy Manifest files (legacy behavioure) Qt::Vertical 20 40 Start the sandboxed RpcSs as a SYSTEM process Qt::Horizontal 40 20 Don't open default COM objects Protect sandboxed SYSTEM processes from unprivileged unsandboxed processes Open System Protected Storage Open Windows Credentials Store 50 false Hide Processes Qt::Vertical 20 40 Add Process Hide host processes from processes running in the sandbox. true Remove Process Dont allow sandboxed processes to see processes running in other boxes 50 false Users Restrict Resource Access monitor to administrators only Add User Qt::Vertical 20 40 Remove User Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. true Tracing Qt::Vertical 20 40 Pipe Trace Log all access events as seen by the driver to the resource access log. This options set the event amsk to "*" - All access events You can customize the logging using the ini by specifying "A" - Allowed accesses "D" - Denidec accesses "I" - Ignore access requests instead of "*". Qt::AlignLeading|Qt::AlignLeft|Qt::AlignTop true 75 true Access Tracing GUI Trace Key Trace File Trace Qt::Horizontal 40 20 IPC Trace Log Debug Output to the Trace Log 50 false Debug true 0 0 98 28 0 0 0 0 75 true WARNING, these options can disable core security guarantees and break sandbox security!!! true These options are intended for debugging compatybility issues, please do not use them in productive use. true App Templates Filter Categories Qt::AlignRight|Qt::AlignTrailing|Qt::AlignVCenter Text Filter true Category Name This list contains a large amount of sandbox comatybility enchancing templates true Edit ini Section Edit ini false false Cancel Qt::Horizontal 40 20 false Save QPlainTextEdit::NoWrap QDialogButtonBox::Apply|QDialogButtonBox::Cancel|QDialogButtonBox::Ok