What is a sandbox?
A sandbox is a complex system used to check files. Unlike a conventional virus scanner, it does not just check whether the file is already known to be a virus: a sandbox executes the file and observes it. This is referred to as “detonating.”
A sandbox simulates an isolated and controlled environment in which programs, email attachments, or files can be executed and their behavior observed without these actions affecting the actual system. This isolated environment can be, for example,
The file to be checked is loaded into this area and detonated. The sandbox then observes what happens. Based on the observed behavior, the sandbox can then draw conclusions about the malware content of the file.
If the file or link exhibits behavior typical of malware, the email is blocked or deleted. This prevents malicious code from being activated by carelessly opening a harmful attachment.
A sandbox is based on the following principles:
Isolation
The software to be examined runs in a separate area, isolated from the real (operating) system and other data. This protects the main system from potential damage.
Simulation
A sandbox is often based on an environment that replicates or emulates a complete operating system. This allows programs to behave as they would on a real computer.
Monitoring
During execution, all interactions—such as file accesses, network connections, or changes to the system—are recorded and analyzed to detect any malicious activity.
Evaluation
If the code shows signs of malicious behavior, the sandbox can stop the process and isolate the object.
Example:
- You open an Office document containing a macro in the sandbox.
- The sandbox detects that the macro is attempting to download and execute a program in the background.
- In the real world (or on a productive system), this would be a virus that would infect the IT environment.
- However, in the sandbox, it remains trapped and cannot cause any damage.
What are the advantages of a sandbox?
A sandbox offers numerous advantages when it comes to email security. It creates an additional layer of protection by isolating suspicious programs or files and closely monitoring their behavior before they gain access to the production system.
This effectively prevents infections, data loss, or manipulation. The ability to detect previously unknown threats—so-called zero-day attacks—is crucial, as the sandbox analyzes the actual behavior of files and does not rely solely on known signatures.
For companies, this means they can significantly reduce their risks with regard to malicious software. This makes digital communication more secure, as email attachments or links can be tested safely.
Overall, a sandbox combines security, efficiency, and flexibility in defending against modern cyberattacks.
Stay safe with the 32Guards Sandbox
The 32Guards Sandbox Service adds a crucial layer of protection to your security setup: potentially harmful files can be run and analyzed in a protected environment.
The 32Guards Sandbox is based on cloud-based sandbox technology that reliably detects malicious files and quickly distributes this knowledge using comprehensive swarm intelligence.
Intelligent spam filters in NoSpamProxy also ensure that most threats are detected before sandboxing needs to be used. The additional advantage: less time and resources are required, and networks and infrastructures are relieved.
Before a file is uploaded to the sandbox, a hash value is created and the sandbox asks whether it already knows the hash. If the hash is known, it also asks whether it has been classified as good or bad. This process is referred to as Level 1 (hash query) and Level 2 (file upload).
The files to be checked are transmitted and checked in encrypted form. To make the scanning process as efficient as possible, the file type is used to predict expected behavior (static analysis) and, if necessary—if the file cannot be clearly classified—an environment optimized for this prediction is launched (dynamic analysis).
All information about processing by the 32Guards sandbox can be clearly viewed in the message tracking.
As soon as a file is detected as malicious, a fingerprint of the respective object is created.
Not yet using NoSpamProxy?
With NoSpamProxy and the 32Guards sandbox, you can reliably protect your company from dangerous emails and benefit from many other security features. Request your free trial now!





