Configuring custom environment
Expand all | Collapse all
After you create a template with default parameters, you need to configure a custom execution environment.
You can create templates only for the following operating systems: Windows XP SP3 (or later), Windows 7, Windows 8.1 x64, or Windows 10 x64 (not higher than 1909 version). Other operating systems are not supported at the moment.
To create a custom environment, access to the internet from the custom environment instance is required. This is needed to generate logging instructions for Windows functions.
During the configuration of a custom environment, access to the internet is provided through a malware channel in case it is configured for the environment.
To configure custom execution environment:
- On the Templates & Storage page of Kaspersky Research Sandbox, select the Templates tab.
- Click the name of the template that you want to configure a custom execution environment for.
The Virtual Network Computing desktop (viewer) opens.
If you close the VNC desktop or navigate to another Kaspersky Research Sandbox page during the template configuration, its state remains Running. Later, you can reopen the VNC desktop by clicking the template name and continue the template configuration.
During the template configuration, perform the following actions, if necessary:
- Click the Turn off button to turn the virtual machine off.
If you use the Turn off button to turn the virtual machine off, virtual machine recovery may be required. Using the Shut down button is recommended.
- Mount the storage media.
- Unmount the storage media.
- Edit the template title and description.
The template cannot be exported or deleted during the configuration process. The corresponding links are not available in the web interface.
- Install and configure the operating systems on the virtual machine.
Supported operating systems and limitations
The following operating systems are supported:
- Windows 7
For using Windows 7 as the custom execution environment, the SHA2 hash support is required. If your operating system does not support SHA2, the image deployment will be interrupted.
To support SHA2, the Security Update for Windows 7 for x64-based Systems (KB3033929) must be installed. For Windows 7 x32 operating systems, the Security Update for Windows 7 (KB3033929) must be installed.
Also, do not install the KB4474419 update. This update causes problems during the deployment.
- Windows 8.1 x64
- Windows 10 x64 (not higher than 1909 version)
You must activate the operating system and other software you install by using your own keys or activation codes. You acknowledge that You are responsible for obtaining and complying with any licenses necessary to operate any such third-party operating systems and application programs. For the avoidance of doubt, this clause does not apply to execution environments and application programs provided by the Kaspersky together with Kaspersky Research Sandbox.
Errors that may occur when activating Microsoft Windows
When you activate Microsoft Windows operating system, the following errors may occur:
0x80072EFD: A connection with the server could not be established.
- Check channel settings, access to Internet and Microsoft servers.
- Check proxy settings in the virtual machine, and try disabling automatic proxy detection.
- Check whether the operating system's firewall and/or anti-virus software are blocking the connection. If necessary, disable the firewall or anti-virus software.
0x80072F8F: A security error occurred (TLS).
- Manually update the root certificates and CTL.
- Check if the time and date are correct.
If the above steps did not help, activate Microsoft Windows by phone.
- Install and configure the required software on the virtual machine.
If you install software that may limit access to the internet, issues may arise when the template is imported to Kaspersky Research Sandbox.
Software that is not allowed to be installed on the virtual machine
- Software that injects its code into another running process.
- Drivers for protection.
- Anti-virus (including Windows Defender) and other protection software.
- If you install Microsoft Office (not higher than 2016 version is supported) on the virtual machine, it is recommended that you configure its settings to improve malware detection.
Recommended Microsoft Office settings
Microsoft Office configuration
Settings
|
Recommended value
|
Comments
|
Activation
|
Activation over the Internet.
|
You can specify this option on the first start of any Microsoft Office application on the virtual machine.
You must activate the software by using your own keys or activation codes.
You acknowledge that You are responsible for obtaining and complying with any licenses necessary to operate any such third-party operating systems and application programs. For the avoidance of doubt, this clause does not apply to execution environments and application programs provided by the Kaspersky together with Kaspersky Research Sandbox.
|
Microsoft Update
|
Disabled.
|
You can specify this option on the first start of any Microsoft Office application on the virtual machine.
|
Microsoft Trust Center
|
ActiveX® settings:
- Enabled usage of all ActiveX controls without limitations and authorization prompts.
- Disabled Safe mode.
Enabled macros in all Microsoft Office applications.
Disabled verification of documents received from dangerous sites or referring to such sites.
Enabled options for Microsoft Excel:
- Enable all Data Connections.
- Enable automatic updates for all Workbook Links.
|
–
|
Microsoft Outlook
|
Disabled RSS feeds synchronization with Common Feed List.
|
–
|
Macro Security
|
No security check for macros (not recommended).
|
–
|
Microsoft Trusted Center for Programmatic Access (for Microsoft Office 2007 and higher)
|
Never warn me about suspicious activity (not recommended)
|
–
|
Automatic acceptance of the End User License Agreement (for Microsoft Office 2016 and higher)
|
Enabled.
Add parameter AcceptAllEulas (REG_DWORD) = 1 in the registry key: HKCU\Software\Microsoft\Office\16.0\Registration
|
–
|
Opening documents in the Protected View mode (for Microsoft Office 2010 and higher)
|
Disabled.
Add a path c:\ with subfolders (Word, Excel, PowerPoint, Access®) to Trusted locations.
|
–
|
Additional parameters
|
Add the following parameters of the REG_DWORD type with value 1 to the Registry Editor:
ExcelBypassEncryptedMacroScan to the key HKEY_CURRENT_USER\Software\Microsoft\Office\<office_version>\Excel\SecurityWordBypassEncryptedMacroScan to the key HKEY_CURRENT_USER\Software\Microsoft\Office\<office_version>\Word\SecurityPowerPointBypassEncryptedMacroScan to the key HKEY_CURRENT_USER\Software\Microsoft\Office\<office_version>\PowerPoint\SecurityAccessBypassEncryptedMacroScan to the key HKEY_CURRENT_USER\Software\Microsoft\Office\<office_version>\Access\SecurityPublisherBypassEncryptedMacroScan to the key HKEY_CURRENT_USER\Software\Microsoft\Office\<office_version>\Publisher\Security
|
In case the macros are password-protected, the operating system blocks execution of such macros if no installed and running anti-virus software is detected.
|
- For the correct functioning of a custom environment, perform the required actions (local administrator privileges are required on a virtual machine):
- Make sure you do not change the default shell. This can make it impossible to run files on virtual machine.
- It is strongly recommended that you perform the following actions:
- Activate the operating system and other licensed software by using your key or activation codes.
- Turn off the automatic updates for all installed software.
After you finish configuring the custom environment, you can deploy it and use it for file execution.
Page top