SlideShare a Scribd company logo
1 of 12
Auto-Sandbox Technology™Auto-Sandbox Technology™
Define Auto-SandboxDefine Auto-Sandbox
TechnologyTechnology
The sandbox is a virtual operating environment for untrusted
programs – ensuring viruses and other malicious software are
completely isolated from the rest of your computer.
Run an Application in the Sandbox forRun an Application in the Sandbox for
Computer SecurityComputer Security
Comodo Endpoint Security allows you to run programs inside the
Sandbox on a 'one-off' basis. This is helpful to test the behavior of
new executables that you have downloaded or for applications that
you are not sure that you trust.
Adding a program in this way means that it will run in the Sandbox
this time only. On subsequent executions it will not run in the
sandbox (presuming it passes the sandboxing process).
You can also create a desktop shortcut to run the application inside
the sandbox on future occasions. The following image shows hows
a 'virtual' shortcut will appear on your desktop:
To run an application in the Sandbox:
Open the Sandbox Tasks interface and Click 'Run Virtual'.
The 'Run Virtual' dialog will be displayed.
To run an application inside the sandbox, click 'Choose and Run' then browse to
the application. The application will run with a green border indicating that it is
sandboxed. If you wish to run the application in the sandbox in future, then select
'Create a virtual desktop shortcut'.
Browse to the application and click 'Open'. In the example above, Open Office
Writer is chosen.
Alternatively, you can run an application inside the sandbox by the following
shortcut methods:
→ By dragging-and-dropping the application on to CES Home screen
→ From the context sensitive menu
→ Running browsers inside sandbox
Drag-and-drop the application on to CES Home Screen:
The Home screen of the Comodo Endpoint Security interface has a flippable pane at the
left side allowing you to run instant scans or run a program in sandbox. To flip the pane to
carry out these tasks, just click the curved arrow at the top right side of the pane.
To run a program in a sandbox, first flip the pane by clicking the curved arrow at the top
right side to display 'Sandbox Objects'.
Now, navigate to the program in your system that you want to run in sandboxed
environment and just drag and drop into the box.
Running a program from the context sensitive menu
Navigate to the program in your system that you want to run in sandboxed environment
and right click on it
Choose 'Run in Comodo Sandbox' from the context sensitive menu
Running Browsers inside the Sandbox
The CES Desktop Widget displays shortcut icons of the browsers installed in your
computer.
Choose 'Run in Comodo Sandbox' from the context sensitive menu
Clicking on a browser icon will start the browser inside the sandbox.
Resource:Resource:
https://enterprise.comodo.com/security-solutions/endpoint-protection/auto-sandboxing.phphttps://enterprise.comodo.com/security-solutions/endpoint-protection/auto-sandboxing.php

More Related Content

Similar to Auto sanbox technology a complete overview

Android Programing Course Material Labs
Android Programing Course Material LabsAndroid Programing Course Material Labs
Android Programing Course Material LabsShady Selim
 
Android Training Ahmedabad , Android Project Training Ahmedabad, Android Live...
Android Training Ahmedabad , Android Project Training Ahmedabad, Android Live...Android Training Ahmedabad , Android Project Training Ahmedabad, Android Live...
Android Training Ahmedabad , Android Project Training Ahmedabad, Android Live...NicheTech Com. Solutions Pvt. Ltd.
 
Fixing browser redirection viruses
Fixing browser redirection virusesFixing browser redirection viruses
Fixing browser redirection virusesscottgelbard123
 
How to work with code blocks
How to work with code blocksHow to work with code blocks
How to work with code blocksTech Bikram
 
Hp Load Runner Tutorial 1 How Do We Record An Application Using Load Runner
Hp Load Runner Tutorial 1   How Do We Record An Application Using Load RunnerHp Load Runner Tutorial 1   How Do We Record An Application Using Load Runner
Hp Load Runner Tutorial 1 How Do We Record An Application Using Load RunnerYogindernath Gupta
 
Firebase crashlytics integration in iOS swift (dSYM File Required Problem Res...
Firebase crashlytics integration in iOS swift (dSYM File Required Problem Res...Firebase crashlytics integration in iOS swift (dSYM File Required Problem Res...
Firebase crashlytics integration in iOS swift (dSYM File Required Problem Res...InnovationM
 
How to develop a Flutter app.pdf
How to develop a Flutter app.pdfHow to develop a Flutter app.pdf
How to develop a Flutter app.pdfSmith Daniel
 
How to remove smart shopsave.com
How to remove smart shopsave.comHow to remove smart shopsave.com
How to remove smart shopsave.comcoseanonans
 
Laboratorio: Desarrollo para Smart Devices
Laboratorio: Desarrollo para Smart DevicesLaboratorio: Desarrollo para Smart Devices
Laboratorio: Desarrollo para Smart DevicesGeneXus
 
Android software development – the first few hours
Android software development – the first few hoursAndroid software development – the first few hours
Android software development – the first few hourssjmarsh
 
Lesson 02 - React Native Development Environment Setup
Lesson 02 - React Native Development Environment SetupLesson 02 - React Native Development Environment Setup
Lesson 02 - React Native Development Environment SetupUniversity of Catania
 
Getting Enter in Android development
Getting Enter in Android developmentGetting Enter in Android development
Getting Enter in Android developmentGhufran Hashmi
 
Mobile os by waqas
Mobile os by waqasMobile os by waqas
Mobile os by waqas8neutron8
 
Containers Lab
Containers Lab Containers Lab
Containers Lab Dev_Events
 
Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.comkingh05
 
Jenkins CI/CD setup for iOS in Mac OSX
Jenkins CI/CD setup for iOS in Mac OSXJenkins CI/CD setup for iOS in Mac OSX
Jenkins CI/CD setup for iOS in Mac OSXGagan Vishal Mishra
 
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.pptCHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.pptManjuAppukuttan2
 
Build your first rpa bot using IBM RPA automation
Build your first rpa bot using IBM RPA automationBuild your first rpa bot using IBM RPA automation
Build your first rpa bot using IBM RPA automationWinton Winton
 
Bai thuc hanh lap trinh Android so 1
Bai thuc hanh lap trinh Android so 1Bai thuc hanh lap trinh Android so 1
Bai thuc hanh lap trinh Android so 1Frank Pham
 

Similar to Auto sanbox technology a complete overview (20)

Android Programing Course Material Labs
Android Programing Course Material LabsAndroid Programing Course Material Labs
Android Programing Course Material Labs
 
Android Training Ahmedabad , Android Project Training Ahmedabad, Android Live...
Android Training Ahmedabad , Android Project Training Ahmedabad, Android Live...Android Training Ahmedabad , Android Project Training Ahmedabad, Android Live...
Android Training Ahmedabad , Android Project Training Ahmedabad, Android Live...
 
Fixing browser redirection viruses
Fixing browser redirection virusesFixing browser redirection viruses
Fixing browser redirection viruses
 
How to work with code blocks
How to work with code blocksHow to work with code blocks
How to work with code blocks
 
Hp Load Runner Tutorial 1 How Do We Record An Application Using Load Runner
Hp Load Runner Tutorial 1   How Do We Record An Application Using Load RunnerHp Load Runner Tutorial 1   How Do We Record An Application Using Load Runner
Hp Load Runner Tutorial 1 How Do We Record An Application Using Load Runner
 
Firebase crashlytics integration in iOS swift (dSYM File Required Problem Res...
Firebase crashlytics integration in iOS swift (dSYM File Required Problem Res...Firebase crashlytics integration in iOS swift (dSYM File Required Problem Res...
Firebase crashlytics integration in iOS swift (dSYM File Required Problem Res...
 
How to develop a Flutter app.pdf
How to develop a Flutter app.pdfHow to develop a Flutter app.pdf
How to develop a Flutter app.pdf
 
How to remove smart shopsave.com
How to remove smart shopsave.comHow to remove smart shopsave.com
How to remove smart shopsave.com
 
Laboratorio: Desarrollo para Smart Devices
Laboratorio: Desarrollo para Smart DevicesLaboratorio: Desarrollo para Smart Devices
Laboratorio: Desarrollo para Smart Devices
 
Android software development – the first few hours
Android software development – the first few hoursAndroid software development – the first few hours
Android software development – the first few hours
 
Lesson 02 - React Native Development Environment Setup
Lesson 02 - React Native Development Environment SetupLesson 02 - React Native Development Environment Setup
Lesson 02 - React Native Development Environment Setup
 
Getting Enter in Android development
Getting Enter in Android developmentGetting Enter in Android development
Getting Enter in Android development
 
Mobile os by waqas
Mobile os by waqasMobile os by waqas
Mobile os by waqas
 
Containers Lab
Containers Lab Containers Lab
Containers Lab
 
Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.com
 
Jenkins CI/CD setup for iOS in Mac OSX
Jenkins CI/CD setup for iOS in Mac OSXJenkins CI/CD setup for iOS in Mac OSX
Jenkins CI/CD setup for iOS in Mac OSX
 
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.pptCHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
 
Build your first rpa bot using IBM RPA automation
Build your first rpa bot using IBM RPA automationBuild your first rpa bot using IBM RPA automation
Build your first rpa bot using IBM RPA automation
 
Bai thuc hanh lap trinh Android so 1
Bai thuc hanh lap trinh Android so 1Bai thuc hanh lap trinh Android so 1
Bai thuc hanh lap trinh Android so 1
 
Appium- part 1
Appium- part 1Appium- part 1
Appium- part 1
 

More from William hendric

Beginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL TutorialBeginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL TutorialWilliam hendric
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
How to install_comodo_free_internet_security
How to install_comodo_free_internet_securityHow to install_comodo_free_internet_security
How to install_comodo_free_internet_securityWilliam hendric
 
Facebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacyFacebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacyWilliam hendric
 
From Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingFrom Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingWilliam hendric
 
overview about comodo ev ssl certificate
overview about comodo ev ssl certificateoverview about comodo ev ssl certificate
overview about comodo ev ssl certificateWilliam hendric
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTWilliam hendric
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoWilliam hendric
 

More from William hendric (9)

Beginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL TutorialBeginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL Tutorial
 
Network security
Network securityNetwork security
Network security
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
How to install_comodo_free_internet_security
How to install_comodo_free_internet_securityHow to install_comodo_free_internet_security
How to install_comodo_free_internet_security
 
Facebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacyFacebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacy
 
From Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingFrom Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack Everything
 
overview about comodo ev ssl certificate
overview about comodo ev ssl certificateoverview about comodo ev ssl certificate
overview about comodo ev ssl certificate
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPT
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodo
 

Recently uploaded

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 

Recently uploaded (20)

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 

Auto sanbox technology a complete overview

  • 2. Define Auto-SandboxDefine Auto-Sandbox TechnologyTechnology The sandbox is a virtual operating environment for untrusted programs – ensuring viruses and other malicious software are completely isolated from the rest of your computer.
  • 3. Run an Application in the Sandbox forRun an Application in the Sandbox for Computer SecurityComputer Security Comodo Endpoint Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust. Adding a program in this way means that it will run in the Sandbox this time only. On subsequent executions it will not run in the sandbox (presuming it passes the sandboxing process). You can also create a desktop shortcut to run the application inside the sandbox on future occasions. The following image shows hows a 'virtual' shortcut will appear on your desktop:
  • 4. To run an application in the Sandbox: Open the Sandbox Tasks interface and Click 'Run Virtual'.
  • 5. The 'Run Virtual' dialog will be displayed.
  • 6. To run an application inside the sandbox, click 'Choose and Run' then browse to the application. The application will run with a green border indicating that it is sandboxed. If you wish to run the application in the sandbox in future, then select 'Create a virtual desktop shortcut'.
  • 7. Browse to the application and click 'Open'. In the example above, Open Office Writer is chosen. Alternatively, you can run an application inside the sandbox by the following shortcut methods: → By dragging-and-dropping the application on to CES Home screen → From the context sensitive menu → Running browsers inside sandbox
  • 8. Drag-and-drop the application on to CES Home Screen: The Home screen of the Comodo Endpoint Security interface has a flippable pane at the left side allowing you to run instant scans or run a program in sandbox. To flip the pane to carry out these tasks, just click the curved arrow at the top right side of the pane.
  • 9. To run a program in a sandbox, first flip the pane by clicking the curved arrow at the top right side to display 'Sandbox Objects'. Now, navigate to the program in your system that you want to run in sandboxed environment and just drag and drop into the box.
  • 10. Running a program from the context sensitive menu Navigate to the program in your system that you want to run in sandboxed environment and right click on it Choose 'Run in Comodo Sandbox' from the context sensitive menu
  • 11. Running Browsers inside the Sandbox The CES Desktop Widget displays shortcut icons of the browsers installed in your computer. Choose 'Run in Comodo Sandbox' from the context sensitive menu Clicking on a browser icon will start the browser inside the sandbox.