After you create a template with default parameters, you need to configure a custom execution environment.
You can create templates only for the following operating systems: Windows XP SP3 (or later), Windows 7, Windows 8.1 x64, or Windows 10 x64 (not higher than 1909 version). Other operating systems are not supported at the moment.
To create a custom environment, access to the internet from the custom environment instance is required. This is needed to generate logging instructions for Windows functions.
During the configuration of a custom environment, access to the internet is provided through a malware channel in case it is configured for the environment.
To configure custom execution environment:
On the Templates & Storage page of Kaspersky Research Sandbox, select the Templates tab.
Click the name of the template that you want to configure a custom execution environment for.
The Virtual Network Computing desktop (viewer) opens.
If you close the VNC desktop or navigate to another Kaspersky Research Sandbox page during the template configuration, its state remains Running. Later, you can reopen the VNC desktop by clicking the template name and continue the template configuration.
During the template configuration, perform the following actions, if necessary:
Press button in the VNC desktop to send the Ctrl+Alt+Del command to the virtual machine. If you press the combination of Ctrl+Alt+Del keys on your keyboard, the lock screen appears on your computer, but not on the virtual machine.
Press button in the VNC desktop to send the Escape command to the virtual machine.
Press button in the VNC desktop to maximize the VNC desktop to the full screen, or minimize it.
Hold and move the button in the VNC desktop to change the pane location.
Click the button to turn on the virtual machine.
Click the Shut down button to shut the virtual machine down (recommended).
If an operating system is not installed on the virtual machine, it is recommended to click the Turn off button instead of Shut down. If you click Shut down, the command processing may be delayed. Please wait for the process to time out and then click Turn off.
Click the Turn off button to turn the virtual machine off.
If you use the Turn off button to turn the virtual machine off, virtual machine recovery may be required. Using the Shut down button is recommended.
For using Windows 7 as the custom execution environment, the SHA2 hash support is required. If your operating system does not support SHA2, the image deployment will be interrupted.
Also, do not install the KB4474419 update. This update causes problems during the deployment.
Windows 8.1 x64
Windows 10 x64 (not higher than 1909 version)
You must activate the operating system and other software you install by using your own keys or activation codes. You acknowledge that You are responsible for obtaining and complying with any licenses necessary to operate any such third-party operating systems and application programs. For the avoidance of doubt, this clause does not apply to execution environments and application programs provided by the Kaspersky together with Kaspersky Research Sandbox.
When you activate Microsoft Windows operating system, the following errors may occur:
0x80072EFD: A connection with the server could not be established.
Check channel settings, access to Internet and Microsoft servers.
Check proxy settings in the virtual machine, and try disabling automatic proxy detection.
Check whether the operating system's firewall and/or anti-virus software are blocking the connection. If necessary, disable the firewall or anti-virus software.
Software that injects its code into another running process.
Drivers for protection.
Anti-virus (including Windows Defender) and other protection software.
If you install Microsoft Office (not higher than 2016 version is supported) on the virtual machine, it is recommended that you configure its settings to improve malware detection.
You can specify this option on the first start of any Microsoft Office application on the virtual machine.
You must activate the software by using your own keys or activation codes.
You acknowledge that You are responsible for obtaining and complying with any licenses necessary to operate any such third-party operating systems and application programs. For the avoidance of doubt, this clause does not apply to execution environments and application programs provided by the Kaspersky together with Kaspersky Research Sandbox.
Microsoft Update
Disabled.
You can specify this option on the first start of any Microsoft Office application on the virtual machine.
Microsoft Trust Center
ActiveX® settings:
Enabled usage of all ActiveX controls without limitations and authorization prompts.
Disabled Safe mode.
Enabled macros in all Microsoft Office applications.
Disabled verification of documents received from dangerous sites or referring to such sites.
Enabled options for Microsoft Excel:
Enable all Data Connections.
Enable automatic updates for all Workbook Links.
–
Microsoft Outlook
Disabled RSS feeds synchronization with Common Feed List.
–
Macro Security
No security check for macros (not recommended).
–
Microsoft Trusted Center for Programmatic Access (for Microsoft Office 2007 and higher)
Never warn me about suspicious activity (not recommended)
–
Automatic acceptance of the End User License Agreement (for Microsoft Office 2016 and higher)
Enabled.
Add parameter AcceptAllEulas (REG_DWORD) = 1 in the registry key: HKCU\Software\Microsoft\Office\16.0\Registration
–
Opening documents in the Protected View mode (for Microsoft Office 2010 and higher)
Disabled.
Add a path c:\ with subfolders (Word, Excel, PowerPoint, Access®) to Trusted locations.
–
Additional parameters
Add the following parameters of the REG_DWORD type with value 1 to the Registry Editor:
ExcelBypassEncryptedMacroScan to the key HKEY_CURRENT_USER\Software\Microsoft\Office\<office_version>\Excel\Security
WordBypassEncryptedMacroScan to the key HKEY_CURRENT_USER\Software\Microsoft\Office\<office_version>\Word\Security
PowerPointBypassEncryptedMacroScan to the key HKEY_CURRENT_USER\Software\Microsoft\Office\<office_version>\PowerPoint\Security
AccessBypassEncryptedMacroScan to the key HKEY_CURRENT_USER\Software\Microsoft\Office\<office_version>\Access\Security
PublisherBypassEncryptedMacroScan to the key HKEY_CURRENT_USER\Software\Microsoft\Office\<office_version>\Publisher\Security
In case the macros are password-protected, the operating system blocks execution of such macros if no installed and running anti-virus software is detected.
For the correct functioning of a custom environment, perform the required actions (local administrator privileges are required on a virtual machine):