Sophos Central Endpoint and SEC: Computers fail/hang on boot after the Microsoft Windows April 9, 2019 update. Please follow knowledge base article 133945
Learn about the Benefits of Multi-Factor Authentication (MFA). Turn your MFA on now!
We'd love to hear about it! Click here to go to the product suggestion community
Can anyone please tell me how to allow uBlock Origin to write/save changes to its filters through Sandboxie, when using Firefox. I'm running the browser sandboxed, make my selections of items to block (using the Element Zapper tool), but of course when closing the sandbox those selections are gone. I'd like to be able to make permanent changes...I had this ability using Adblock Plus, have switched to UBO, and definitely would like the same functionality.
Have a look at the direct access options:Resource Access - File
Using that, you can allow desired files/locations to bypass the sandbox.
In reply to Barb@Sophos:
Thank you for the reply. Could you please tell me if this looks correct, as it doesn't seem to be working? Several files within the folder are written/saved when blocking an item (un-sandboxed), so I would like to allow direct access to the entire folder from within the sandbox:
This is in the Sandbox settings UI, under Resource Access-->File Access-->Direct Access. Do I need to make a separate line for each file written, or create an * wildcard, or modify the .ini, or ???
Thank you again.
In reply to IntermediateUser:
Here are some examples of OpenFilePath that contain wildcards, among other things:https://www.sandboxie.com/OpenFilePath
Once you have identified the location you want to bypass, you need to add it to the direct access list. You can add the absolute path (if it doesn't change/have multiple targets), or a folder and use a wildcard. FYI %AppData% will direct you to Roaming already, so your location should be something like
Based on your last post, here's what I would do (remember that you are punching holes and bypassing the Sandbox when you do this, so continue at your own discretion) %appdata%\Mozilla\Firefox\Profiles\six9ka6u.default\storage\default\*
That would allow everything under the "default" folder to be bypassed. You want to make sure you have the right target before doing this.
That seems to have done it. The extension folder is now being updated when I block browser elements from within Sandboxie. Thank you!
I would suggest using the following:
Otherwise you allow the storage of data from websites (IndexedDB).