--- title: WindowsSandbox Policy CSP description: Learn more about the WindowsSandbox Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa ms.date: 01/09/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage ms.topic: reference --- # Policy CSP - WindowsSandbox ## AllowAudioInput | Scope | Editions | Applicable OS | |:--|:--|:--| | :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | ```Device ./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowAudioInput ``` This policy setting enables or disables audio input to the Sandbox. - If you enable this policy setting, Windows Sandbox will be able to receive audio input from the user. Applications using a microphone may require this setting. - If you disable this policy setting, Windows Sandbox will not be able to receive audio input from the user. Applications using a microphone may not function properly with this setting. - If you do not configure this policy setting, audio input will be enabled. **Note** that there may be security implications of exposing host audio input to the container. > [!NOTE] > You must restart Windows Sandbox for any changes to this policy setting to take effect. **Description framework properties**: | Property name | Property value | |:--|:--| | Format | int | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | **Group policy mapping**: | Name | Value | |:--|:--| | Name | AllowAudioInput | | Friendly Name | Allow audio input in Windows Sandbox | | Location | Computer Configuration | | Path | Windows Components > Windows Sandbox | | Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\Sandbox | | Registry Value Name | AllowAudioInput | | ADMX File Name | WindowsSandbox.admx | ## AllowClipboardRedirection | Scope | Editions | Applicable OS | |:--|:--|:--| | :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | ```Device ./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowClipboardRedirection ``` This policy setting enables or disables clipboard sharing with the sandbox. - If you enable this policy setting, copy and paste between the host and Windows Sandbox are permitted. - If you disable this policy setting, copy and paste in and out of Sandbox will be restricted. - If you do not configure this policy setting, clipboard sharing will be enabled. > [!NOTE] > You must restart Windows Sandbox for any changes to this policy setting to take effect. **Description framework properties**: | Property name | Property value | |:--|:--| | Format | int | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | **Group policy mapping**: | Name | Value | |:--|:--| | Name | AllowClipboardRedirection | | Friendly Name | Allow clipboard sharing with Windows Sandbox | | Location | Computer Configuration | | Path | Windows Components > Windows Sandbox | | Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\Sandbox | | Registry Value Name | AllowClipboardRedirection | | ADMX File Name | WindowsSandbox.admx | ## AllowNetworking | Scope | Editions | Applicable OS | |:--|:--|:--| | :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | ```Device ./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowNetworking ``` This policy setting enables or disables networking in the sandbox. You can disable network access to decrease the attack surface exposed by the sandbox. - If you enable this policy setting, networking is done by creating a virtual switch on the host, and connects the Windows Sandbox to it via a virtual NIC. - If you disable this policy setting, networking is disabled in Windows Sandbox. - If you do not configure this policy setting, networking will be enabled. **Note** that enabling networking can expose untrusted applications to the internal network. > [!NOTE] > You must restart Windows Sandbox for any changes to this policy setting to take effect. **Description framework properties**: | Property name | Property value | |:--|:--| | Format | int | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | **Group policy mapping**: | Name | Value | |:--|:--| | Name | AllowNetworking | | Friendly Name | Allow networking in Windows Sandbox | | Location | Computer Configuration | | Path | Windows Components > Windows Sandbox | | Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\Sandbox | | Registry Value Name | AllowNetworking | | ADMX File Name | WindowsSandbox.admx | ## AllowPrinterRedirection | Scope | Editions | Applicable OS | |:--|:--|:--| | :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | ```Device ./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowPrinterRedirection ``` This policy setting enables or disables printer sharing from the host into the Sandbox. - If you enable this policy setting, host printers will be shared into Windows Sandbox. - If you disable this policy setting, Windows Sandbox will not be able to view printers from the host. - If you do not configure this policy setting, printer redirection will be disabled. > [!NOTE] > You must restart Windows Sandbox for any changes to this policy setting to take effect. **Description framework properties**: | Property name | Property value | |:--|:--| | Format | int | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | **Group policy mapping**: | Name | Value | |:--|:--| | Name | AllowPrinterRedirection | | Friendly Name | Allow printer sharing with Windows Sandbox | | Location | Computer Configuration | | Path | Windows Components > Windows Sandbox | | Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\Sandbox | | Registry Value Name | AllowPrinterRedirection | | ADMX File Name | WindowsSandbox.admx | ## AllowVGPU | Scope | Editions | Applicable OS | |:--|:--|:--| | :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | ```Device ./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowVGPU ``` This policy setting is to enable or disable the virtualized GPU. - If you enable this policy setting, vGPU will be supported in the Windows Sandbox. - If you disable this policy setting, Windows Sandbox will use software rendering, which can be slower than virtualized GPU. - If you do not configure this policy setting, vGPU will be enabled. **Note** that enabling virtualized GPU can potentially increase the attack surface of the sandbox. > [!NOTE] > You must restart Windows Sandbox for any changes to this policy setting to take effect. **Description framework properties**: | Property name | Property value | |:--|:--| | Format | int | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | **Group policy mapping**: | Name | Value | |:--|:--| | Name | AllowVGPU | | Friendly Name | Allow vGPU sharing for Windows Sandbox | | Location | Computer Configuration | | Path | Windows Components > Windows Sandbox | | Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\Sandbox | | Registry Value Name | AllowVGPU | | ADMX File Name | WindowsSandbox.admx | ## AllowVideoInput | Scope | Editions | Applicable OS | |:--|:--|:--| | :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | ```Device ./Device/Vendor/MSFT/Policy/Config/WindowsSandbox/AllowVideoInput ``` This policy setting enables or disables video input to the Sandbox. - If you enable this policy setting, video input is enabled in Windows Sandbox. - If you disable this policy setting, video input is disabled in Windows Sandbox. Applications using video input may not function properly in Windows Sandbox. - If you do not configure this policy setting, video input will be disabled. Applications that use video input may not function properly in Windows Sandbox. **Note** that there may be security implications of exposing host video input to the container. > [!NOTE] > You must restart Windows Sandbox for any changes to this policy setting to take effect. **Description framework properties**: | Property name | Property value | |:--|:--| | Format | int | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | **Group policy mapping**: | Name | Value | |:--|:--| | Name | AllowVideoInput | | Friendly Name | Allow video input in Windows Sandbox | | Location | Computer Configuration | | Path | Windows Components > Windows Sandbox | | Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\Sandbox | | Registry Value Name | AllowVideoInput | | ADMX File Name | WindowsSandbox.admx | ## Related articles [Policy configuration service provider](policy-configuration-service-provider.md)