Your suggestion for a stronger system-wide sandbox model in Windows is aligned with ongoing efforts to enhance security in the operating system. Currently, Windows does provide features like Windows Sandbox, which allows users to run untrusted applications in an isolated environment, preventing them from affecting the host system. This feature utilizes hardware-based virtualization technology to ensure that any untrusted application remains contained within the sandbox.
The idea of blocking applications from opening CMD or PowerShell unless explicitly allowed is an interesting approach to further restrict application capabilities and enhance security. While Windows does have mechanisms to limit application permissions through features like AppContainers, implementing a more robust system-wide sandboxing approach would require a significant architectural change.
Additionally, integrating automatic scanning of downloaded files by Windows Defender before execution could further mitigate risks associated with malware. Currently, Windows Defender provides real-time protection and can scan files, but the implementation of a default sandbox for all executable files would enhance the security posture significantly.
Such enhancements would indeed contribute to making Windows a safer environment for users, especially in light of increasing cybersecurity threats.