{"id":52480,"date":"2023-06-14T15:36:51","date_gmt":"2023-06-14T15:36:51","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/"},"modified":"2023-06-14T15:36:51","modified_gmt":"2023-06-14T15:36:51","slug":"public-preview-improve-win32-app-security-via-app-isolation","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/","title":{"rendered":"Public preview: Improve Win32 app security via app isolation"},"content":{"rendered":"<p>We are thrilled to announce the public preview launch of Win32 app isolation. This blog post provides an overview of the topic. To learn more about the developer experience and engage with the team, please visit our <a href=\"https:\/\/github.com\/microsoft\/win32-app-isolation\">GitHub page<\/a>.<\/p>\n<p>It is worth noting that Win32 app isolation is an addition to the family of existing Windows sandbox options, such as <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-sandbox\/windows-sandbox-overview\">Windows Sandbox<\/a> and<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-application-guard\/md-app-guard-overview\"> Microsoft Defender Application Guard<\/a>. While these options are based on virtualization based security, Win32 app isolation is built on the foundation of <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/secauthz\/implementing-an-appcontainer\">AppContainers<\/a> (and more). <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/secauthz\/implementing-an-appcontainer\">AppContainers<\/a> are specifically designed to encapsulate and restrict the execution of processes, helping to ensure they operate with limited privileges, commonly referred to as low integrity levels.<\/p>\n<h3>Win32 App isolation<\/h3>\n<p>The frequency and impact of zero-day vulnerabilities have witnessed a substantial increase over the years. Attackers frequently focus their attention on popular applications, exploiting either unknown or unpatched vulnerabilities. That\u2019s why we strongly advocate for the integration of preventive and containment measures.<\/p>\n<p>To this end, we propose using the combined power of Win32 app isolation and cutting-edge technologies like <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/apps\/develop\/smart-app-control\/overview\">Smart App Control<\/a>, which together work to effectively block untrusted applications and limit damage if trusted apps are compromised. By implementing this approach, a robust security strategy can be established, significantly mitigating the potential harm caused by zero-day attacks.<\/p>\n<p>Win32 app isolation is a new security feature designed to be the default isolation standard on Windows clients. It is built on<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/secauthz\/implementing-an-appcontainer\"> AppContainers<\/a> and offers several added security features to help windows platform defend against attacks that leverage vulnerabilities in the application (this could be 3P libraries as well). To isolate their apps, application developers can update their applications using the tools provided by Microsoft. For more information on Win32 app Isolation developer experience, please visit our <a href=\"https:\/\/github.com\/microsoft\/win32-app-isolation\">GitHub page<\/a>.<\/p>\n<figure class=\"wp-image wp-image--no-caption alignnone\">\n<div class=\"alignwrap\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-56813 size-large\" src=\"https:\/\/blogs.windows.com\/wp-content\/uploads\/prod\/sites\/3\/2023\/06\/Figure1-LayeredApproach-1024x545.png\" alt=\"Diagram showing how preventive and containment strategies can be applied.\" width=\"1024\" height=\"545\"><\/div>\n<\/figure>\n<p><em>Figure 1: Combining Preventive and Containment Strategies.<\/em><\/p>\n<p>Another benefit of isolation is to safeguard end-user privacy choices in the event of a breach. When a Win32 app runs with the same privilege as the user, it is possible to allow itself access to user\u2019s information without the user\u2019s consent. Consequently, there is a risk of unauthorized access to the user\u2019s privacy data by malicious actors without their knowledge or consent.<\/p>\n<h3>Goals of Win32 app isolation<\/h3>\n<figure class=\"wp-image wp-image--no-caption alignnone\">\n<div class=\"alignwrap\"><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-56814 size-large\" src=\"https:\/\/blogs.windows.com\/wp-content\/uploads\/prod\/sites\/3\/2023\/06\/Figure2-Objectives-1024x449.png\" alt=\"Diagram showing goals of Win32 app isolation\" width=\"1024\" height=\"449\"><\/div>\n<\/figure>\n<p><em>Figure 2: Key objectives of Win32 app isolation<\/em><\/p>\n<p><strong>Limit damage<\/strong>: Win32 app isolation achieves its goal of limiting impact (in the event apps are compromised) by running apps with low privilege, which requires a multi-step attack to break out of the container. Attackers must target a specific capability or vulnerability, compared to having broad access and since the attack must be directed at a specific vulnerability, mitigation patches can be quickly applied, reducing the shelf life of the attack.<\/p>\n<p><strong>Reduce developer effort<\/strong>: To reduce the effort required for developers to update their apps, Microsoft provides developer tools and experiences, with a focus on the MSIX packaging tool and the Application Capability Profiler.<\/p>\n<p><strong>Seamless user experience<\/strong>: Finally, while the focus is on security, it is critical that security decisions are not delegated to end-users via cryptic security prompts, and application compatibility is maintained.<\/p>\n<h3>Limit damage<\/h3>\n<p>The protection offered by Win32 App isolation follows a two-step process. In the first step, the Win32 application is launched as a low integrity process using <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/secauthz\/implementing-an-appcontainer\">AppContainer<\/a>, which is recognized as a security boundary by Microsoft. Consequently, the process is limited to a specific set of Windows APIs by default and is unable to inject code into any process operating at a higher integrity level.<\/p>\n<p>In the second step, the least privilege is enforced by granting authorized access to Windows securable objects. This access is determined by capabilities that are added to the application manifest through MSIX packaging. Securable objects in this context refer to Windows resources whose access is safeguarded by capabilities. These capabilities serve as a means to implement a <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/secauthz\/access-control-lists\">Discretionary Access Control List <\/a>on Windows.<\/p>\n<h3>Reduce developer effort<\/h3>\n<p>To help ensure that isolated applications run smoothly, developers must define the access requirements for the application via access capability declarations in the application package manifest.<\/p>\n<p>The Application Capability Profiler <strong>(ACP<\/strong>) simplifies the entire process by allowing the application to run in \u201clearn-mode\u201d with low privileges. Instead of failing access if the capability is not present, ACP allows access <strong>and logs additional capabilities required for access if the application were to run isolated<\/strong>.<\/p>\n<figure class=\"wp-image wp-image--no-caption alignnone\">\n<div class=\"alignwrap\"><img decoding=\"async\" loading=\"lazy\" class=\" size-large wp-image-56815\" src=\"https:\/\/blogs.windows.com\/wp-content\/uploads\/prod\/sites\/3\/2023\/06\/Figure3-Overview-of-ACP-1024x340.png\" alt=\"Diagram showing the different steps involved in profiling your Win32 app\" width=\"1024\" height=\"340\"><\/div>\n<\/figure>\n<p><em>Figure 3: Overview of Application Capability Profiler<\/em><\/p>\n<p>Under the hood, <strong>ACP<\/strong> uses the Windows Performance Analyzer data layer backend (<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-hardware\/test\/wpt\/windows-performance-analyzer\">WPA<\/a>) and parses Event Trace Logs (<strong>ETL<\/strong>) to provide a list of additional capabilities needed. ETLs are detailed and verbose, and ACP parses them to output missing capabilities as a file. Once the capabilities are output, they can simply be included in the application package manifest.<\/p>\n<p>Finally, ACP provides a WPA profile file \u201c<em>ACP-StackTrace.wpaProfile\u201d<\/em> that allows the user to easily configure WPA to inspect the event trace logs captured (in learn-mode) for relevant call stack information. In most cases, call stack analysis using WPA is not required.<\/p>\n<p>For more information on <strong>ACP<\/strong>, please refer to the Github documentation page, linked <a href=\"https:\/\/github.com\/microsoft\/win32-app-isolation\/blob\/main\/docs\/profiler\/application-capability-profiler.md#stack-tracing---acp-stacktracewpaprofile\">here<\/a>.<\/p>\n<h3>Seamless user experience<\/h3>\n<p>To create a smooth user experience that aligns with non-isolated\/native Win32 applications, two key factors should be taken into consideration, as outlined below. The first factor relates to implementing methods to manage access to files and privacy information within and outside the isolation boundary (<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/secauthz\/implementing-an-appcontainer\">AppContainer<\/a>). The second factor involves integrating Win32 apps with other Windows interfaces in a way that helps enable seamless functionality without causing perplexing user consent prompts. Now, let\u2019s explore these factors in greater detail:<\/p>\n<ol>\n<li>Approaches for accessing data and privacy information;<\/li>\n<li>Integrating Win32 Apps for compatibility with other Windows interfaces;<\/li>\n<\/ol>\n<h3>Approaches for accessing data and privacy information.<\/h3>\n<p>Access to a user\u2019s private data, such as camera, microphone, location, images, files, or folders, is not permitted without the user\u2019s permission. However, the app may require access to certain program files, such as .NET libraries or protected registry keys. Asking for permission to access user folders is intuitive, but asking for permission to access program files and registry keys can be confusing for users. This confusion can be exploited by a compromised Win32 app to trick the user into allowing access to a registry key or sensitive file, which can then be used to escape the sandbox.<\/p>\n<figure class=\"wp-image wp-image--no-caption alignnone\">\n<div class=\"alignwrap\"><img decoding=\"async\" loading=\"lazy\" class=\" size-large wp-image-56816\" src=\"https:\/\/blogs.windows.com\/wp-content\/uploads\/prod\/sites\/3\/2023\/06\/Figure4-Managing-User-Consent-1024x484.png\" alt=\"Diagram showing various methods to reduce unnecessary prompts presented to user\" width=\"1024\" height=\"484\"><\/div>\n<\/figure>\n<p><em>Figure 4: Effectively managing user consents.<\/em><\/p>\n<p>To help prevent unauthorized access, several instrumentations have been built. Win32 apps need to explicitly include the \u201c<em>isolatedWin32-promptForAccess<\/em>\u201d capability and declare their intent to support prompting. Apps that do not require access to user\u2019s data outside the app can opt out of any kind of user prompting for consent. Note, this capability only allows control over filesystem access, access to privacy related information such as camera, location and microphone shall always prompt.<\/p>\n<p>Let us now discuss approaches on how user consents are obtained. User prompts are displayed when user consent is required, and the context of the prompt should be meaningful to the end user, such as accessing the user\u2019s documents or camera. The other way to grant consent to files is via user selection such as when the user selects a file via the file dialog or by right clicking the context menu.<\/p>\n<p>When the user grants consent to a specific file for the isolated application, the isolated application interfaces with Windows <strong>Brokering File System<\/strong> (BFS) and grants access to the files via a mini filter driver. BFS simply opens the file and serves as the interface between the isolated application and BFS.<\/p>\n<p>File and registry virtualization helps ensure that apps continue to work while not updating the base file or registry. This also minimizes any user experience friction while maintaining application compatibility. Protected namespaces are created to allow access only to the app and do not require user consent. For example, access to a folder that has a property only known to the Win32 app and required for app compatibility can be granted.<\/p>\n<h3>Integrations with Win32 app isolation for compatibility<\/h3>\n<figure class=\"wp-image wp-image--no-caption alignnone\">\n<div class=\"alignwrap\"><img decoding=\"async\" loading=\"lazy\" class=\" size-large wp-image-56817\" src=\"https:\/\/blogs.windows.com\/wp-content\/uploads\/prod\/sites\/3\/2023\/06\/Picture5-MaintainingAppCompat-1024x509.png\" alt=\"Diagram showing various methods applied to maintain app compatibility.\" width=\"1024\" height=\"509\"><\/div>\n<\/figure>\n<p><em>Figure 5: Maintaining app compatibility with isolation.<\/em><\/p>\n<p>In order to achieve a high level of similarity and feature parity between isolated and non-isolated Win32 applications, certain allowances have been made. Specifically, Win32 apps operating with low privileges (referred to as low integrity level) are permitted to interact with file systems and various APIs. For example, interactions involving File Type Associations, including the \u201copen with\u201d option, COM servers, and file drag and drop, are facilitated through BFS (File System Broker).<\/p>\n<p>Furthermore, capabilities included in the application manifest enable interactions with other Windows components, such as shell notifications and system tray icons. This ensures that these functionalities can be utilized without compromising the security of these applications.<\/p>\n<h3>What\u2019s Next!<\/h3>\n<p>To summarize, Win32 app isolation enhances security for Windows clients by using <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/secauthz\/implementing-an-appcontainer\">AppContainer<\/a> and additional security controls (as described above) to help reduce the risk of damage from compromised applications and help safeguard user privacy. The approach enforces least privilege through added capabilities and employs various strategies to help prevent unauthorized access, while minimizing developer effort and maintaining application compatibility.<\/p>\n<p>To learn more about isolating your existing or new Win32 Apps, visit the GitHub page at<a href=\"https:\/\/github.com\/microsoft\/win32-app-isolation\">: microsoft\/win32-app-isolation (github.com)<\/a>. Win32 App Isolation is currently available for public preview. We look forward to your participation!<\/p>\n<p> READ MORE <a href=\"https:\/\/blogs.windows.com\/windowsdeveloper\/2023\/06\/14\/public-preview-improve-win32-app-security-via-app-isolation\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The frequency and impact of zero-day vulnerabilities have witnessed a substantial increase over the years. Attackers frequently exploit either unknown or unpatched vulnerabilities. That\u2019s why we are thrilled to announce the preview of Win32 app isolation.<br \/>\nThe post Public preview: Improve Win32 app security via app isolation appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52481,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-52480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Public preview: Improve Win32 app security via app isolation 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Public preview: Improve Win32 app security via app isolation 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-14T15:36:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.windows.com\/wp-content\/uploads\/prod\/sites\/3\/2023\/06\/Figure1-LayeredApproach-1024x545.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Public preview: Improve Win32 app security via app isolation\",\"datePublished\":\"2023-06-14T15:36:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/\"},\"wordCount\":1551,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/public-preview-improve-win32-app-security-via-app-isolation.png\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/\",\"name\":\"Public preview: Improve Win32 app security via app isolation 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/public-preview-improve-win32-app-security-via-app-isolation.png\",\"datePublished\":\"2023-06-14T15:36:51+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/public-preview-improve-win32-app-security-via-app-isolation.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/public-preview-improve-win32-app-security-via-app-isolation.png\",\"width\":1024,\"height\":545},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/public-preview-improve-win32-app-security-via-app-isolation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Public preview: Improve Win32 app security via app isolation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Public preview: Improve Win32 app security via app isolation 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/","og_locale":"en_US","og_type":"article","og_title":"Public preview: Improve Win32 app security via app isolation 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-14T15:36:51+00:00","og_image":[{"url":"https:\/\/blogs.windows.com\/wp-content\/uploads\/prod\/sites\/3\/2023\/06\/Figure1-LayeredApproach-1024x545.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Public preview: Improve Win32 app security via app isolation","datePublished":"2023-06-14T15:36:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/"},"wordCount":1551,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/public-preview-improve-win32-app-security-via-app-isolation.png","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/","url":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/","name":"Public preview: Improve Win32 app security via app isolation 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/public-preview-improve-win32-app-security-via-app-isolation.png","datePublished":"2023-06-14T15:36:51+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/public-preview-improve-win32-app-security-via-app-isolation.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/public-preview-improve-win32-app-security-via-app-isolation.png","width":1024,"height":545},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/public-preview-improve-win32-app-security-via-app-isolation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Public preview: Improve Win32 app security via app isolation"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52480"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52480\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52481"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}