This summary of the video was created by an AI. It might contain some inaccuracies.
00:00:00 – 00:06:44
In the video, Kevin explains how to use Windows Sandbox on Windows 10 Professional or Enterprise to safely test potentially malicious files on a separate virtual computer, ensuring the main system remains secure. He provides a detailed guide on enabling this feature and highlights its benefits, such as preventing threats and maintaining system integrity. Kevin demonstrates testing a suspicious file from a former employee, Adele Vance, which turns out to be malicious, within the sandbox environment. By closing the sandbox, the system returns to its default state, showcasing its effectiveness. He concludes by encouraging viewers to engage with the content and suggest future topics.
00:00:00
In this part of the video, Kevin discusses how to use the Windows Sandbox. Windows Sandbox allows you to install or open files on a separate virtual computer, ensuring your main system remains unaffected. This function requires Windows 10 Professional or Enterprise and specific system requirements. Kevin explains how to check your Windows version by searching for “System Information” via the taskbar, where it will display your OS name. For those with Windows 10 Home, he offers a guide to upgrade to Professional through the Windows Store for $99, highlighting additional benefits like Remote Desktop, BitLocker, and Hyper-V. Once you have the correct Windows version, you need to enable the Sandbox via “Turn Windows features on or off” and select Windows Sandbox from the list of features.
00:03:00
In this part of the video, the presenter demonstrates how to safely open and test a potentially malicious file using Windows Sandbox. They explain the process of enabling and launching Windows Sandbox, highlighting that it creates a fresh install of Windows 10 where no files or apps are pre-included. The presenter receives a questionable file from a former employee, Adele Vance, and decides to test it in the sandbox environment by copying it into the sandbox and attempting to open it. The file turns out to be malicious, displaying a message indicating the machine has been compromised. However, since it is contained within the virtual environment, the presenter simply closes the sandbox, thereby discarding the malicious file without affecting the main system. They reopen the sandbox to confirm it returns to its default state, emphasizing the effectiveness of this approach in preventing potential threats to their actual machine.
00:06:00
In this part of the video, the speaker decides to delete a potentially harmful file from their computer to ensure safety. They then encourage viewers to like the video, subscribe to the channel for future content, and suggest any topics they want to see covered in the comments. The video concludes with the speaker signing off and expressing hope to see the audience next time.