• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
    • NoSpamProxy 25Reports
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
    • AS4
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
    • Blog
    • Newsletter Subscription
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Sandbox erklärt: Warum sie in der modernen Email Security unverzichtbar ist

Sandbox explained: Why it is indispensable in modern email security

Stefan Feist | Technischer Redakteur
Author: Stefan FeistTechnical Writerhttps://www.linkedin.com/in/stefan-feist-23b257b0/–Connect on LinkedIn

Cybercriminals are using increasingly sophisticated methods to attack companies and individuals via email. They often cleverly disguise their threats in seemingly harmless attachments or links. Conventional virus scanners are increasingly reaching their limits, as new, unknown malware can slip past them. This is where the concept of sandboxing comes in. Suspicious email content is executed in an isolated, virtual test environment so that even unknown attacks can be detected and repelled before they cause damage. In this blog article, you will learn how sandboxing works as an integral part of modern email security strategies, why it is indispensable in times of zero-day threats, and how the 32Guards Sandbox can provide you with lasting protection.

11.08.2025|Last edited:28.08.2025

What is a sandbox?

A sandbox is a complex system used to check files. Unlike a conventional virus scanner, it does not just check whether the file is already known to be a virus: a sandbox executes the file and observes it. This is referred to as “detonating.”

A sandbox simulates an isolated and controlled environment in which programs, email attachments, or files can be executed and their behavior observed without these actions affecting the actual system. This isolated environment can be, for example,

    • a virtual computer (also known as a virtual machine),
    • a specially secured container or
    • a dedicated, protected memory area.

    The file to be checked is loaded into this area and detonated. The sandbox then observes what happens. Based on the observed behavior, the sandbox can then draw conclusions about the malware content of the file.

    If the file or link exhibits behavior typical of malware, the email is blocked or deleted. This prevents malicious code from being activated by carelessly opening a harmful attachment.

    A sandbox is based on the following principles:

    Isolation

    The software to be examined runs in a separate area, isolated from the real (operating) system and other data. This protects the main system from potential damage.

    Simulation

    A sandbox is often based on an environment that replicates or emulates a complete operating system. This allows programs to behave as they would on a real computer.

    Monitoring

    During execution, all interactions—such as file accesses, network connections, or changes to the system—are recorded and analyzed to detect any malicious activity.

    Evaluation

    If the code shows signs of malicious behavior, the sandbox can stop the process and isolate the object.

      Example:

      1. You open an Office document containing a macro in the sandbox.
      2. The sandbox detects that the macro is attempting to download and execute a program in the background.
      3. In the real world (or on a productive system), this would be a virus that would infect the IT environment.
      4. However, in the sandbox, it remains trapped and cannot cause any damage.
        • In this case, an email was temporarily rejected due to a potentially malicious file, as the attachment is still being analyzed in the sandbox.

          32Guards Sandbox Message Tracking Analysis en
        • In this case, an email was rejected due to a malicious file.

          32Guards Sandbox Message Tracking Blocked en
        Previous Previous Previous Next Next Next
        12

        What are the advantages of a sandbox?

        A sandbox offers numerous advantages when it comes to email security. It creates an additional layer of protection by isolating suspicious programs or files and closely monitoring their behavior before they gain access to the production system.

        This effectively prevents infections, data loss, or manipulation. The ability to detect previously unknown threats—so-called zero-day attacks—is crucial, as the sandbox analyzes the actual behavior of files and does not rely solely on known signatures.

        For companies, this means they can significantly reduce their risks with regard to malicious software. This makes digital communication more secure, as email attachments or links can be tested safely.

        Overall, a sandbox combines security, efficiency, and flexibility in defending against modern cyberattacks.

        Stay safe with the 32Guards Sandbox

        The 32Guards Sandbox Service adds a crucial layer of protection to your security setup: potentially harmful files can be run and analyzed in a protected environment.

        The 32Guards Sandbox is based on cloud-based sandbox technology that reliably detects malicious files and quickly distributes this knowledge using comprehensive swarm intelligence.

        Intelligent spam filters in NoSpamProxy also ensure that most threats are detected before sandboxing needs to be used. The additional advantage: less time and resources are required, and networks and infrastructures are relieved.

        Before a file is uploaded to the sandbox, a hash value is created and the sandbox asks whether it already knows the hash. If the hash is known, it also asks whether it has been classified as good or bad. This process is referred to as Level 1 (hash query) and Level 2 (file upload).

        The files to be checked are transmitted and checked in encrypted form. To make the scanning process as efficient as possible, the file type is used to predict expected behavior (static analysis) and, if necessary—if the file cannot be clearly classified—an environment optimized for this prediction is launched (dynamic analysis).

        All information about processing by the 32Guards sandbox can be clearly viewed in the message tracking.

        As soon as a file is detected as malicious, a fingerprint of the respective object is created.

        32Guards Sandbox

        Not yet using NoSpamProxy?

        With NoSpamProxy and the 32Guards sandbox, you can reliably protect your company from dangerous emails and benefit from many other security features. Request your free trial now!

        Get your free NoSpamProxy trial now!
        • share 
        • share 
        • share 
        • email 

        SEARCH

        PRODUCT

        • All Topics
        • NoSpamProxy Cloud
        • NoSpamProxy Protection
        • NoSpamProxy Encryption
        • NospamProxy Large Files

        You need support?

        You can find more information about NoSpamProxy in our documentation and forum.

        CATEGORY

        • All Topics
        • News
        • Product
        • Tech & Support
        • Events

        NoSpamProxy Newsletter

        Subscribe to Newsletter
        RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

        NoSpamProxy

        • NoSpamProxy Cloud
        • NoSpamProxy Encryption
        • NoSpamProxy Large Files
        • NoSpamProxy Disclaimer
        • Price request
        • Team
        • Career
        • General terms and conditions
        • Data Protection Information for Business Partners and Applicants
        • Cybersecurity (PSIRT)

        Partners

        • Becoming a reseller
        • Partners
        • Order Certificates
        • Newsletter

        Categories

        • All topics
        • News
        • Support
        • Updates
        • Order certificates

        Latest News

        • E-Mail-Archivierung: Mit NoSpamProxy rechtliche Anforderungen erfüllen 800x800
          Email archiving: How to meet legal requirements with NoSpamProxy08.12.2025 - 10:00
        • NoSpamProxy-und-Dropsuite-schließen-strategische-Partnerschaft-Preview
          NoSpamProxy & Dropsuite Introduce Bundle on ALSO Cloud Marketplace28.11.2025 - 10:00
        • Fileless Malware 800x800
          Fileless malware, or: The Ghost In The Machine25.11.2025 - 10:00
        IMPRINT • EULA • Privacy Policy • • © 2025 Net at Work GmbH
        • Link to Rss this site
        • Link to LinkedIn
        • Link to Youtube
        • Link to X
        • Link to Instagram
        Link to: Time-of-Click Protection – with the URL Safeguard in NoSpamProxy Link to: Time-of-Click Protection – with the URL Safeguard in NoSpamProxy Time-of-Click Protection – with the URL Safeguard in NoSpamProxy Link to: Email penetration tests: How secure is your email security? Link to: Email penetration tests: How secure is your email security? E-Mail-Penetrationstest: Wie steht es um Ihre Mail Security? PreviewEmail penetration tests: How secure is your email security?
        Scroll to top Scroll to top Scroll to top