This paper proposes enhancing trusted domain enforcement through a VMM interruption mechanism. Current systems lack fine-grained input validation and dynamic access control to resources. The proposed system detects illegal inputs and moves processes to an untrusted domain for sandboxing. When an invalid input is detected, the guest OS notifies the VMM through virtualized interrupts. The VMM then isolates the compromised domain by disabling its network and block devices. The system was implemented through Linux kernel patches and a security module to validate inputs and enforce domain transitions. Performance testing showed the module approach had lower overhead than modifying the kernel directly.