This allows you to do the below things in Windows Sandbox just from a right-click by adding context menus:
- Run PS1 as user or system in Sandbox
- Run CMD, VBS, EXE, MSI in Sandbox
- Run Intunewin file
- Open URL or HTML file in Sandbox
- Open PDF file in Sandbox
- Extract ZIP file directly in Sandbox
- Extract 7z file directly in Sandbox
- Extract ISO directly in Sandbox
- Share a specific folder in Sandbox
- Run multiple app´s/scripts in the same Sandbox session
Note that this project has been build on personal time, it's not a professional project. Use it at your own risk, and please read How to install it before running it.
All the steps need to be executed from the Host, not inside the Sandbox
- Right-click on the Windows start menu and select PowerShell or Terminal (Not CMD), preferably as admin.
- Copy and paste the code below and press enter:
- You will see the process being started. You will probably be asked to grant admin rights if not started as admin.
- That's all.
Note - On older Windows builds you may need to run the below command first:
[Net.ServicePointManager]::SecurityProtocol=[Net.SecurityProtocolType]::Tls12
This method allows you to use the parameters "-NoCheckpoint" to skip creation of a restore point and "-NoSilent" to give a bit more output
- Download the ZIP Run-in-Sandbox project (this is the main prerequiste)
- Extract the ZIP
- The Run-in-Sandbox-master should contain at least Add_Structure.ps1 and a Sources folder
- Please do not download only Add_Structure.ps1
- The Sources folder should contain folder Run_in_Sandbox containing 58 files
- Once you have downloaded the folder structure, check if files have not be blocked after download
- Do a right-click on Add_Structure.ps1 and check if needed check Unblocked
- Run Add_Structure.ps1 with admin rights