Skip to content

Commit

Permalink
Fixes and additions
Browse files Browse the repository at this point in the history
  • Loading branch information
isaak654 committed Feb 16, 2024
1 parent 5366462 commit 17bdf28
Show file tree
Hide file tree
Showing 33 changed files with 100 additions and 59 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ jobs:
uses: lycheeverse/[email protected]
with:
# Check all markdown files in repo
args: -vvv --no-progress --accept 200,429 './**/*.md'
args: -vvv --no-progress --max-redirects 30 --accept 200,429 './**/*.md'
fail: true

# To avoid automated spam, try to find an existing open issue before opening a new one
Expand Down
4 changes: 2 additions & 2 deletions Content/AlertFolder.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,6 @@ Usage:
AlertFolder=%ProgramFiles%\Mozilla Firefox
```

Related Sandboxie Plus setting:
Related Sandboxie Plus setting: Options menu > Global Settings > Program Control > Program Alerts

Options > Global Settings > Program Control > Program Alerts
See also: [Alert Process](AlertProcess.md).
10 changes: 7 additions & 3 deletions Content/AlertProcess.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,11 @@ Usage:
AlertProcess=firefox.exe
```

Related [Sandboxie Control](SandboxieControl.md) settings:
* [Program Settings](ProgramSettings.md)
* [Configure Menu > Alert Programs](ConfigureMenu.md#program-alerts)

See also:
* [Program Settings](ProgramSettings.md).
* [Configure Menu > Alert Programs](ConfigureMenu.md#program-alerts).
Related Sandboxie Plus setting:
* Options menu > Global Settings > Program Control > Program Alerts

See also: [Alert Folder](AlertFolder.md).
6 changes: 4 additions & 2 deletions Content/AutoDelete.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Auto Delete
# Auto Delete

AutoDelete is a sandbox setting in [Sandboxie Ini](SandboxieIni.md). It is typically specified as AutoDelete=y, and indicates that the contents of the sandbox should be automatically deleted after each use. For example:
AutoDelete is a sandbox setting in [Sandboxie Ini](SandboxieIni.md). It is typically specified as AutoDelete=y, and indicates that the contents of the sandbox should be automatically deleted as soon as the last sandboxed process is terminated. For example:
```
.
.
Expand All @@ -10,3 +10,5 @@ AutoDelete is a sandbox setting in [Sandboxie Ini](SandboxieIni.md). It is typic
```

Related [Sandboxie Control](SandboxieControl.md) setting: [Sandbox Settings > Delete > Invocation](DeleteSettings.md#invocation)

Related Sandboxie Plus setting: Sandbox Options > File Options > Box Delete options > Auto delete content when last sandboxed process terminates
4 changes: 1 addition & 3 deletions Content/ClosedClsid.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,4 @@ Usage:

This example makes the _Windows Management and Instrumentation_ not accessible to sandboxed programs.

Related Sandboxie Plus setting:

Sandbox Options > Resource Access > COM
Related Sandboxie Plus setting: Sandbox Options > Resource Access > COM > Add COM Object > Access column > Closed
2 changes: 2 additions & 0 deletions Content/ClosedFilePath.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,3 +35,5 @@ The third example (spanning four lines) disables Internet access within a sandbo
**Note:** Unlike the corresponding OpenFilePath setting, the _ClosedFilePath_ settings always applies to sandboxed programs, whether the program executable file resides within the sandbox, or out of it.

Related [Sandboxie Control](SandboxieControl.md) setting: [Sandbox Settings > Resource Access > File Access > Blocked Access](ResourceAccessSettings.md#file-access--blocked-access)

Related Sandboxie Plus setting: Sandbox Options > Resource Access > Files > Add File/Folder > Access column > Closed
2 changes: 2 additions & 0 deletions Content/ClosedIpcPath.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,3 +23,5 @@ This setting accepts wildcards. For more information on the use of wildcards in
**Note:** Unlike the corresponding [OpenIpcPath](OpenIpcPath.md) setting, the _ClosedKeyPath_ settings always applies to sandboxed programs, whether the program executable file resides within the sandbox, or out of it.

Related [Sandboxie Control](SandboxieControl.md) setting: [Sandbox Settings > Resource Access > IPC Access > Blocked Access](ResourceAccessSettings.md#ipc-access--blocked-access)

Related Sandboxie Plus setting: Sandbox Options > Resource Access > IPC > Add IPC Path > Access column > Closed
4 changes: 1 addition & 3 deletions Content/ClosedKeyPath.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,4 @@ The value specified for _ClosedKeyPath_ can include wildcards, although for regi

Related [Sandboxie Control](SandboxieControl.md) setting: [Sandbox Settings > Resource Access > Registry Access > Blocked Access](ResourceAccessSettings.md#registry-access--blocked-access)

* * *

Go to [Sandboxie Ini](SandboxieIni.md).
Related Sandboxie Plus setting: Sandbox Options > Resource Access > Registry > Add Reg Key > Access column > Closed
4 changes: 1 addition & 3 deletions Content/ClosedRT.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,4 @@ Usage:

This example makes the _ExampleRT_ interface not accessible to sandboxed programs.

Related Sandboxie Plus setting:

Sandbox Options > Resource Access > COM
Related Sandboxie Plus setting: Sandbox Options > Resource Access > COM > Add COM Object > Access column > Closed RT
6 changes: 6 additions & 0 deletions Content/FileRootPath.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,12 @@ Usage:
FileRootPath=C:\Sandbox\MySandbox
```

Related [Sandboxie Control](SandboxieControl.md) setting: [Sandbox menu > Set Container Folder](SandboxMenu.md#set-container-folder)

Related Sandboxie Plus setting: Options menu > Global Settings > Advanced Config > Sandboxie Config > Sandbox file system root

**Technical Details**

The following substitution variables may be useful in this path.

* [Shell Folders](ShellFolders.md) variables such as %Personal% which expands to the user's Documents folder
Expand Down
4 changes: 1 addition & 3 deletions Content/NoRenameWinClass.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,4 @@ The first setting tells Sandboxie to not translate _ExampleWinClass_ window clas

The second setting tells Sandboxie to not translate window class names created by _program.exe_ by making them accessible to sandboxed programs, and goes a step further to disable a few other windowing-related Sandboxie functions. This may also cause the Sandboxie indicator [#] to not appear in window titles.

Related Sandboxie Plus setting:

Sandbox Options > General Options > Resource Access > Wnd
Related Sandboxie Plus setting: Sandbox Options > Resource Access > Wnd > Add Wnd Class > Access column > No Rename
2 changes: 2 additions & 0 deletions Content/NormalFilePath.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,3 +16,5 @@ Example:
NormalFilePath=iexplore.exe,%Favorites%
NormalFilePath=msimn.exe,*.eml
```

Related Sandboxie Plus setting: Sandbox Options > Resource Access > Files > Add File/Folder > Access column > Normal
2 changes: 2 additions & 0 deletions Content/NormalIpcPath.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,3 +11,5 @@ Example:
[DefaultBox]
NormalIpcPath=\RPC Control\AudioSrv
```

Related Sandboxie Plus setting: Sandbox Options > Resource Access > IPC > Add IPC Path > Access column > Normal
3 changes: 2 additions & 1 deletion Content/NormalKeyPath.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,5 +20,6 @@ Example:
NormalIpcPath=\RPC Control\epmapper
NormalIpcPath=\RPC Control\OLE*
NormalIpcPath=\RPC Control\LRPC*
```

```
Related Sandboxie Plus setting: Sandbox Options > Resource Access > Registry > Add Reg Key > Access column > Normal
6 changes: 2 additions & 4 deletions Content/NotifyProcessAccessDenied.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,8 +11,6 @@ Usage:
NotifyProcessAccessDenied=y
```

Related Sandboxie Plus setting:
Related Sandboxie Plus setting: Sandbox Options > General Options > Restrictions > Other restrictions > Issue message 2111 when a process access is denied

Sandbox Options > General Options > Resource Access > IPC

Sandbox Options > General Options > Restrictions > Other restrictions
For more information, see [SBIE2111](SBIE2111.md).
6 changes: 6 additions & 0 deletions Content/OpenClsid.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,3 +14,9 @@ Examples:
This example makes the HP Universal Printer Status Monitor pop-up component accessible to sandboxed programs.

Related [Sandboxie Control](SandboxieControl.md) setting: [Sandbox Settings > Resource Access > COM Access](ResourceAccessSettings.md#com-access)

Related Sandboxie Plus settings:

Sandbox Options > Resource Access > COM > Add COM Object > Access column > Open

Sandbox Options > Resource Access > COM > Don't use virtualized COM, Open access to hosts COM infrastructure (not recommended)
2 changes: 2 additions & 0 deletions Content/OpenConfPath.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,3 +21,5 @@ These examples let the Firefox program, _firefox.exe_, have direct access to the
The value specified for _OpenConfPath_ can include wildcards, although for registry keys, the use of wildcards is rarely needed. For more information on this, including examples that show the use of wildcards, see [OpenFilePath](OpenFilePath.md). (_OpenFilePath_ deals with files, not registry keys, but the principle of using wildcards remains the same.)

**Note:** This setting does apply even when the program executable file resides within the sandbox. This means that (potentially malicious) software downloaded into your computer and executed, can take advantage of this setting.

Related Sandboxie Plus setting: Sandbox Options > Resource Access > Registry > Add Reg Key > Access column > Open for All
2 changes: 2 additions & 0 deletions Content/OpenCredentials.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,3 +21,5 @@ To manage Windows credentials, start Control Panel > User Accounts, select an ac
**Note:** Sandboxie stores credentials in the sandboxed protected storage. Thus, if the setting _Save outside sandbox: History of search strings and invoked commands_ in [Sandbox Settings > Applications > Web Browser](ApplicationsSettings.md#web-browser) is enabled, credentials will not be stored in the sandbox, regardless of the OpenCredentials setting.

~~Related [Sandboxie Control](SandboxieControl.md) setting: _Save outside sandbox: Account information for Hotmail and Messenger_ in [Sandbox Settings > Applications > Web Browser](ApplicationsSettings.md#web-browser)~~ (no longer available since Sandboxie v0.8.0 / 5.50.0)

Related Sandboxie Plus setting: Sandbox Options > General Options > Restrictions > Other restrictions > Open System Protected Storage
2 changes: 2 additions & 0 deletions Content/OpenFilePath.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,3 +33,5 @@ The fourth example combines the previous two examples, by showing a path contain
A setting similar to _OpenFilePath_, which is _always_ applied, is [OpenPipePath](OpenPipePath.md).

Related [Sandboxie Control](SandboxieControl.md) setting: [Sandbox Settings > Resource Access > File Access > Direct Access](ResourceAccessSettings.md#file-access--direct-access)

Related Sandboxie Plus setting: Sandbox Options > Resource Access > Files > Add File/Folder > Access column > Open
2 changes: 2 additions & 0 deletions Content/OpenIpcPath.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,3 +38,5 @@ The third example permits a program running inside the sandbox to have full acce
**Note:** The examples in this page, if applied, will create vulnerabilities within the sandbox. They are meant only to show why some resources are blocked, and how they can be un-blocked and exposed for use, if necessary.

Related [Sandboxie Control](SandboxieControl.md) setting: [Sandbox Settings > Resource Access > IPC Access > Direct Access](ResourceAccessSettings.md#ipc-access--direct-access)

Related Sandboxie Plus setting: Sandbox Options > Resource Access > IPC > Add IPC Path > Access column > Open
2 changes: 2 additions & 0 deletions Content/OpenKeyPath.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,3 +21,5 @@ The value specified for _OpenKeyPath_ can include wildcards, although for regist
**Note:** For security reasons, this setting does not apply when the program executable file resides within the sandbox. This means that (potentially malicious) software downloaded into your computer and executed, cannot take advantage of this setting.

Related [Sandboxie Control](SandboxieControl.md) setting: [Sandbox Settings > Resource Access > Registry Access > Direct Access](ResourceAccessSettings.md#registry-access--direct-access)

Related Sandboxie Plus setting: Sandbox Options > Resource Access > Registry > Add Reg Key > Access column > Open
2 changes: 2 additions & 0 deletions Content/OpenPipePath.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,3 +25,5 @@ Will allow the sandboxed program to manage shares and user accounts on the compu
**Note:** This specific example is not recommended, as it weakens the protection of the sandbox.

Related [Sandboxie Control](SandboxieControl.md) setting: [Sandbox Settings > Resource Access > File Access > Full Access](ResourceAccessSettings.md#file-access--full-access)

Related Sandboxie Plus setting: Sandbox Options > Resource Access > Files > Add File/Folder > Access column > Open for All
10 changes: 10 additions & 0 deletions Content/OpenWinClass.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,3 +44,13 @@ Note that OpenWinClass=* allows full communication with all windows outside the
**Identifying Window Class Names**

The unsandboxed windows are identified by their _window class name_, which is an internal name given to the window by the application that created it. You can use a tool like [WinSpy](https://www.catch22.net/software/winspy) to identify window class names. The [Resource Access Monitor](ResourceAccessMonitor.md) tool in Sandboxie Classic and the [Trace Logging](../PlusContent/TraceLog.md) tool in Sandboxie Plus also display window class names.

Related Sandboxie Plus settings:

Sandbox Options > Resource Access > Wnd > Add Wnd Class > Access column > Open

Sandbox Options > Resource Access > Wnd > Add Wnd Class > Access column > Ignore UIPI

Sandbox Options > Resource Access > Wnd > Don't alter window class names created by sandboxed programs

See also: [No Rename Win Class](NoRenameWinClass.md).
Loading

0 comments on commit 17bdf28

Please sign in to comment.