I reserve for "unknown" files the folder E:\Guest-2-Host\
The contents of which I may wish to use after ensuring freedom from infection.
I have used CACLS on XP Home to relax access control in my favour.
I am not familiar with ICACLS in Windows 7 Ultimate and would like advice on restricting danger by malware within E:\Guest-2-Host\
I envisage applying access restrictions to the folder that will be inherited by all its contents whilst they reside inside.
My desktop uses Windows 7 Ultimate x64 and is running VirtualBox
The Guest contained by VirtualBox could be identical to the Host if based on yesterday's Macrium image backup,
or a non-identical Windows 7 or Windows XP
The Guest will be given "FULL" access to the shared folder V:\ so that it can place files in E:\Guest-2-Host\, subject to Desktop creation of V:\ by
SUBST V: E:\Guest-2-Host
Normally I will NOT create V:\ and "what happens in Guest stays in Guest" and never gets home to Host.
When I want to use the Guest to provide files for the Host I will first create V:\, and that opens the door for Guest Malware to enter the Host.
Access Controls are to be applied by the Desktop/Host and should prevent execution,
both by the Guest/malware and also by Host/me having a clicking accident.
Both Guest and Host should have Write and Delete access.
The Host must have read and copy access, but the Guest has no such need.
There seem to be several dozen flavours of access and rights and grants/denials and Explicit\Inherited.
I would appreciate advice on how to "lock down" potential malware as tightly as possible.
N.B. If the Desktop/Host needs "execute" or some other blocked access I expect to :-
confirm freedom from infection whilst within E:\Guest-2-Host\,
and then move/copy the file to a different folder with full inherited permissions.
Regards
Alan