A patron walks in to the library and comes up to the service desk. They show their phone and say, "I need to print this."
We get them on a public computer.
We get them on a public computer.
We say, "Email the reference account, reference@publiclibrary.org"
We've saved time, both on behalf of ourselves and the patron.
We've avoided potential frustration at library systems and infrastructure.
And library workers don't have to be drawn away troubleshooting technical problems.
We've saved time, both on behalf of ourselves and the patron.
We've avoided potential frustration at library systems and infrastructure.
And library workers don't have to be drawn away troubleshooting technical problems.
And we just exposed ourselves to a lot of them.
And we just exposed ourselves to a lot of them.
A temporary lightweight desktop environment to safely run applications in isolation.
Building systems based on the assumption that a breach will happen.
Part of Windows: Everything required for this feature is included in Windows 10 Pro and Enterprise. There's no need to download a VHD.
Pristine: Every time Windows Sandbox runs, it's as clean as a brand-new installation of Windows.
Disposable: Nothing persists on the device. Everything is discarded when the user closes the application.
Secure: Uses hardware-based virtualization for kernel isolation. It relies on the Microsoft hypervisor to run a separate kernel that isolates Windows Sandbox from the host.
Efficient: Uses the integrated kernel scheduler, smart memory management, and virtual GPU.
Configuration is done through a .wsb file written in XML. The file is then also used to launch the sandbox either as a desktop shortcut or invoking it through the command line.
The parameters and their values are documented on the Microsoft Docs site.
An instance of Microsoft Edge running natively in a Hyper-V isolated container.
Microsoft Defender Application Guard - Windows security | Microsoft Docs
MDAG is built for enterprise environments.
Microsoft envisions using it as part of a specific IT environment where a sysadmin defines trusted vs. untrusted sites.
Microsoft Defender Application Guard - Windows security | Microsoft Docs
We use a dedicated printing email through our Google Workspace account.
A scripting platform based on Javascript that includes libraries for interacting with Google workspace applications.
Two functions that run every night at 1am:
The QR code is a mailto: link to our printing email, so when a patron scans the picture, their email client should open with the to: field already populated.
Our website runs on Wordpress, so we use a free plugin called Contact Form 7 to allow patrons to submit their documents using a web form.
They fill out an ID, whether they want black & white or color, how many copies, and the file gets emailed right to the printing address with all the information populated in the subject line.
The process is more private because the document is not sent from the patron's email.
Back end (Form template)
Andrew Ward
warda@thetroylibrary.org
https://codeberg.org/Pribrariam/SandboxPrinting