If any Webroot developer/engineer is interested in assisting me in developing a Sandboxie template to allow WSA filtering/identity shield/password vault to operate in sandboxed browsers please send me a PM. We will be building something like what is below, a sample of the Kaspersky template.
[Template_Kaspersky]
Tmpl.Title=Kaspersky Anti-Virus/Internet Security
Tmpl.Class=Security
Tmpl.Url=http://www.kaspersky.com/kaspersky_internet_security
Tmpl.Scan=s
Tmpl.ScanService=klim5
Tmpl.ScanService=klim6
OpenIpcPath=RPC ControlPRRemote:*
OpenIpcPath=*BaseNamedObjects*PRCustomProps*
OpenIpcPath=*BaseNamedObjects*PREvent*
OpenIpcPath=*BaseNamedObjects*PRObjects*
OpenIpcPath=*BaseNamedObjects*KLObj_mt_KLSCRIPTCHECKER_PR_*
OpenIpcPath=*BaseNamedObjects*__hex30-90__
OpenPipePath=DeviceNamedPipesa_hlp_srv
LingerProcess=klwtblfs.exe
# following setting comes from value DataRoot of the following key
# HKEY_LOCAL_MACHINESOFTWAREWow6432NodeKasperskyLabprotectedAVP9environment
OpenPipePath=%Tmpl.KasperskyDataRoot%~PR*.dat
[Template_Kaspersky_Pure_Password_Manager]
Tmpl.Title=Kaspersky Pure Password Manager
Tmpl.Class=Security
Tmpl.Url=http://www.kaspersky.com/kaspersky_internet_security
Tmpl.Scan=s
Tmpl.ScanProduct={1A59064A-12A9-469F-99F6-04BF118DBCFF}
# settings from Sticky Password template
OpenIpcPath=*BaseNamedObjects*Mutex*Process*API*
OpenIpcPath=*BaseNamedObjects*NamedBuffer*Process*API*
OpenIpcPath=*BaseNamedObjects*AutoUnhookMap*
OpenIpcPath=*BaseNamedObjects*mchLLEW2*
OpenIpcPath=*BaseNamedObjects*mchMixCache*
OpenIpcPath=*BaseNamedObjects*PCActivityHookInfo:*
OpenIpcPath=*BaseNamedObjects*spAutofillInfo:*
OpenIpcPath=*BaseNamedObjects*spCaptionButtonInfo:*
OpenIpcPath=*BaseNamedObjects*TtsMappedObject_Tts*
OpenIpcPath=*BaseNamedObjects*{CEA68AE7-EF0E-4AD5-9BAF-38DB1A30EF56-*
OpenIpcPath=*BaseNamedObjects*spPasswordAssistantClosedEvent:*
OpenWinClass=$:stpass.exe
NoRenameWinClass=Internet Explorer_Server
# settings specific to Kaspersky Pure
OpenIpcPath=*BaseNamedObjects*kpmPasswordAssistantClosedEvent:*
OpenIpcPath=*BaseNamedObjects*kpmAutofillInfo:*
Page 1 / 1
Below is the template for LastPass.
[Template_LastPass]
Tmpl.Title=LastPass
Tmpl.Class=Security
Tmpl.Url=https://lastpass.com/
Tmpl.Scan=s
Tmpl.ScanKey=REGISTRYMACHINESOFTWAREClasseslpgetr
Tmpl.ScanFile=%{A520A1A4-1780-4FF6-BD18-167343C5AF16}%LastPass
OpenFilePath=<Template_LastPass>,%USERPROFILE%*LastPass*
ProcessGroup=<Template_LastPass>,iexplore.exe,firefox.exe,opera.exe,chrome.exe
[Template_LastPass]
Tmpl.Title=LastPass
Tmpl.Class=Security
Tmpl.Url=https://lastpass.com/
Tmpl.Scan=s
Tmpl.ScanKey=REGISTRYMACHINESOFTWAREClasseslpgetr
Tmpl.ScanFile=%{A520A1A4-1780-4FF6-BD18-167343C5AF16}%LastPass
OpenFilePath=<Template_LastPass>,%USERPROFILE%*LastPass*
ProcessGroup=<Template_LastPass>,iexplore.exe,firefox.exe,opera.exe,chrome.exe
Shameless bump 🙂
Hello!
I am checking on this for you as well. I know development is under a bit of a crunch right now but I am asking if this is something that is possible with WSA, amount of resources to acomplish if possible, and ETA...
Thank you sir!
I am checking on this for you as well. I know development is under a bit of a crunch right now but I am asking if this is something that is possible with WSA, amount of resources to acomplish if possible, and ETA...
Thank you sir!
Reply
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.