Bonjour,
There are different ways to access the network. It is very well explained in the link below.
viewtopic.php?f=35&t=96608
The question I have is, is there a way where the security is better?
Regards,
Leloup
VirtualBox connection to internet in term of security
-
- Site Moderator
- Posts: 20965
- Joined: 30. Dec 2009, 20:14
- Primary OS: MS Windows 10
- VBox Version: PUEL
- Guest OSses: Windows, Linux
Re: VirtualBox connection to internet in term of security
No. Once there is an internet connection to a computer, real or VM, whatever can be 'caught' by the OS while internet browsing will be caught. This applies in Virtualbox too, regardless of the Virtualbox network choice.
Bridged, NAT, and NAT Network are the direct-to-internet connections available. (The others can get internet if other setup configurations are made, such as "Sandbox", which will bring internet onto an Internal network.)
NAT and NAT Network put a 'router' between the VM and the LAN, with a port forwarding mini 'firewall'. So these types block network traffic that comes from the internet without the VM OS requesting it, unless you open a port. However, if the non-AV-protected VM OS browses to a compromised website the OS will receive whatever malware the website attempts to deliver.
Bridged puts the VM in the LAN without a port-forwarding 'router' between. So whatever traffic your LAN or your host sees, the VM will see.
Essentially, you should protect the VM OS with antivirus, or practice other proven safety practices, if you want to browse the web inside the VM.
Bridged, NAT, and NAT Network are the direct-to-internet connections available. (The others can get internet if other setup configurations are made, such as "Sandbox", which will bring internet onto an Internal network.)
NAT and NAT Network put a 'router' between the VM and the LAN, with a port forwarding mini 'firewall'. So these types block network traffic that comes from the internet without the VM OS requesting it, unless you open a port. However, if the non-AV-protected VM OS browses to a compromised website the OS will receive whatever malware the website attempts to deliver.
Bridged puts the VM in the LAN without a port-forwarding 'router' between. So whatever traffic your LAN or your host sees, the VM will see.
Essentially, you should protect the VM OS with antivirus, or practice other proven safety practices, if you want to browse the web inside the VM.