Redigera

Dela via


Policy CSP - WindowsSandbox

AllowAudioInput

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 2004 [10.0.19041.4950] and later
✅ Windows 10, version 20H2 [10.0.19042.4950] and later
✅ Windows 10, version 21H1 [10.0.19043.4950] and later
✅ Windows 11, version 21H2 [10.0.22000] and later
./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowAudioInput

This policy setting enables or disables audio input to the Sandbox.

  • If you enable this policy setting, Windows Sandbox will be able to receive audio input from the user. Applications using a microphone may require this setting.

  • If you disable this policy setting, Windows Sandbox won't be able to receive audio input from the user. Applications using a microphone may not function properly with this setting.

  • If you don't configure this policy setting, audio input will be enabled.

Note that there may be security implications of exposing host audio input to the container.

Note

You must restart Windows Sandbox for any changes to this policy setting to take effect.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 1

Allowed values:

Value Description
0 Not allowed.
1 (Default) Allowed.

Group policy mapping:

Name Value
Name AllowAudioInput
Friendly Name Allow audio input in Windows Sandbox
Location Computer Configuration
Path Windows Components > Windows Sandbox
Registry Key Name SOFTWARE\Policies\Microsoft\Windows\Sandbox
Registry Value Name AllowAudioInput
ADMX File Name WindowsSandbox.admx

AllowClipboardRedirection

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 2004 [10.0.19041.4950] and later
✅ Windows 10, version 20H2 [10.0.19042.4950] and later
✅ Windows 10, version 21H1 [10.0.19043.4950] and later
✅ Windows 11, version 21H2 [10.0.22000] and later
./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowClipboardRedirection

This policy setting enables or disables clipboard sharing with the sandbox.

  • If you enable this policy setting, copy and paste between the host and Windows Sandbox are permitted.

  • If you disable this policy setting, copy and paste in and out of Sandbox will be restricted.

  • If you don't configure this policy setting, clipboard sharing will be enabled.

Note

You must restart Windows Sandbox for any changes to this policy setting to take effect.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 1

Allowed values:

Value Description
0 Not allowed.
1 (Default) Allowed.

Group policy mapping:

Name Value
Name AllowClipboardRedirection
Friendly Name Allow clipboard sharing with Windows Sandbox
Location Computer Configuration
Path Windows Components > Windows Sandbox
Registry Key Name SOFTWARE\Policies\Microsoft\Windows\Sandbox
Registry Value Name AllowClipboardRedirection
ADMX File Name WindowsSandbox.admx

AllowMappedFolders

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 11, version 24H2 [10.0.26100] and later
./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowMappedFolders

This policy setting enables or disables mapping folders into sandbox.

  • If you enable this policy setting, mapping folders from the host into Sandbox will be permitted.

  • If you enable this policy setting and disable write to mapped folders, mapping folders from the host into Sandbox will be permitted, but Sandbox will only have permission to read the files.

  • If you disable this policy setting, mapping folders from the host into Sandbox won't be permitted.

  • If you don't configure this policy setting, mapped folders will be enabled.

Note that there may be security implications of exposing folders from the host into the container.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 1

Allowed values:

Value Description
0 Not allowed.
1 (Default) Allowed.

Group policy mapping:

Name Value
Name AllowMappedFolders
Friendly Name Allow mapping folders into Windows Sandbox
Location Computer Configuration
Path Windows Components > Windows Sandbox
Registry Key Name SOFTWARE\Policies\Microsoft\Windows\Sandbox
Registry Value Name AllowMappedFolders
ADMX File Name WindowsSandbox.admx

AllowNetworking

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 2004 [10.0.19041.4950] and later
✅ Windows 10, version 20H2 [10.0.19042.4950] and later
✅ Windows 10, version 21H1 [10.0.19043.4950] and later
✅ Windows 11, version 21H2 [10.0.22000] and later
./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowNetworking

This policy setting enables or disables networking in the sandbox. You can disable network access to decrease the attack surface exposed by the sandbox.

  • If you enable this policy setting, networking is done by creating a virtual switch on the host, and connects the Windows Sandbox to it via a virtual NIC.

  • If you disable this policy setting, networking is disabled in Windows Sandbox.

  • If you don't configure this policy setting, networking will be enabled.

Note that enabling networking can expose untrusted applications to the internal network.

Note

You must restart Windows Sandbox for any changes to this policy setting to take effect.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 1

Allowed values:

Value Description
0 Not allowed.
1 (Default) Allowed.

Group policy mapping:

Name Value
Name AllowNetworking
Friendly Name Allow networking in Windows Sandbox
Location Computer Configuration
Path Windows Components > Windows Sandbox
Registry Key Name SOFTWARE\Policies\Microsoft\Windows\Sandbox
Registry Value Name AllowNetworking
ADMX File Name WindowsSandbox.admx

AllowPrinterRedirection

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 2004 [10.0.19041.4950] and later
✅ Windows 10, version 20H2 [10.0.19042.4950] and later
✅ Windows 10, version 21H1 [10.0.19043.4950] and later
✅ Windows 11, version 21H2 [10.0.22000] and later
./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowPrinterRedirection

This policy setting enables or disables printer sharing from the host into the Sandbox.

  • If you enable this policy setting, host printers will be shared into Windows Sandbox.

  • If you disable this policy setting, Windows Sandbox won't be able to view printers from the host.

  • If you don't configure this policy setting, printer redirection will be disabled.

Note

You must restart Windows Sandbox for any changes to this policy setting to take effect.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 1

Allowed values:

Value Description
0 Not allowed.
1 (Default) Allowed.

Group policy mapping:

Name Value
Name AllowPrinterRedirection
Friendly Name Allow printer sharing with Windows Sandbox
Location Computer Configuration
Path Windows Components > Windows Sandbox
Registry Key Name SOFTWARE\Policies\Microsoft\Windows\Sandbox
Registry Value Name AllowPrinterRedirection
ADMX File Name WindowsSandbox.admx

AllowVGPU

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 2004 [10.0.19041.4950] and later
✅ Windows 10, version 20H2 [10.0.19042.4950] and later
✅ Windows 10, version 21H1 [10.0.19043.4950] and later
✅ Windows 11, version 21H2 [10.0.22000] and later
./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowVGPU

This policy setting is to enable or disable the virtualized GPU.

  • If you enable this policy setting, vGPU will be supported in the Windows Sandbox.

  • If you disable this policy setting, Windows Sandbox will use software rendering, which can be slower than virtualized GPU.

  • If you don't configure this policy setting, vGPU will be enabled.

Note that enabling virtualized GPU can potentially increase the attack surface of the sandbox.

Note

You must restart Windows Sandbox for any changes to this policy setting to take effect.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 1

Allowed values:

Value Description
0 Not allowed.
1 (Default) Allowed.

Group policy mapping:

Name Value
Name AllowVGPU
Friendly Name Allow vGPU sharing for Windows Sandbox
Location Computer Configuration
Path Windows Components > Windows Sandbox
Registry Key Name SOFTWARE\Policies\Microsoft\Windows\Sandbox
Registry Value Name AllowVGPU
ADMX File Name WindowsSandbox.admx

AllowVideoInput

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 2004 [10.0.19041.4950] and later
✅ Windows 10, version 20H2 [10.0.19042.4950] and later
✅ Windows 10, version 21H1 [10.0.19043.4950] and later
✅ Windows 11, version 21H2 [10.0.22000] and later
./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowVideoInput

This policy setting enables or disables video input to the Sandbox.

  • If you enable this policy setting, video input is enabled in Windows Sandbox.

  • If you disable this policy setting, video input is disabled in Windows Sandbox. Applications using video input may not function properly in Windows Sandbox.

  • If you don't configure this policy setting, video input will be disabled. Applications that use video input may not function properly in Windows Sandbox.

Note that there may be security implications of exposing host video input to the container.

Note

You must restart Windows Sandbox for any changes to this policy setting to take effect.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 1

Allowed values:

Value Description
0 Not allowed.
1 (Default) Allowed.

Group policy mapping:

Name Value
Name AllowVideoInput
Friendly Name Allow video input in Windows Sandbox
Location Computer Configuration
Path Windows Components > Windows Sandbox
Registry Key Name SOFTWARE\Policies\Microsoft\Windows\Sandbox
Registry Value Name AllowVideoInput
ADMX File Name WindowsSandbox.admx

AllowWriteToMappedFolders

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 11, version 24H2 [10.0.26100] and later
./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowWriteToMappedFolders

This policy setting enables or disables mapping folders into sandbox.

  • If you enable this policy setting, mapping folders from the host into Sandbox will be permitted.

  • If you enable this policy setting and disable write to mapped folders, mapping folders from the host into Sandbox will be permitted, but Sandbox will only have permission to read the files.

  • If you disable this policy setting, mapping folders from the host into Sandbox won't be permitted.

  • If you don't configure this policy setting, mapped folders will be enabled.

Note that there may be security implications of exposing folders from the host into the container.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 1
Dependency [WindowsSandbox_AllowWriteToMappedFolders_DependencyGroup] Dependency Type: DependsOn
Dependency URI: Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowMappedFolders
Dependency Allowed Value: [1]
Dependency Allowed Value Type: Range

Allowed values:

Value Description
0 Not allowed.
1 (Default) Allowed.

Group policy mapping:

Name Value
Name AllowMappedFolders
Friendly Name Allow mapping folders into Windows Sandbox
Location Computer Configuration
Path Windows Components > Windows Sandbox
Registry Key Name SOFTWARE\Policies\Microsoft\Windows\Sandbox
Registry Value Name AllowMappedFolders
ADMX File Name WindowsSandbox.admx

Policy configuration service provider