Because I need tools that any home and SMB user can use easily and SanboxIE ain't that tool, it just ain't.
Why not? I thought you were meant to be an experienced IT person, doing something like System Center Configuration Management should be trivial for you.
And why would i want to go to the trouble of downloading some other program just to make up for the fact that the FF devs are shitty when it comes to security, when I can give them any Chromium based browser instead and just be done with it?
Because you're relying on just the security provided through the browser, when you could limit the browser's capability from effecting the entire OS.
I also don't see why you'd think SandboxIE would be more secure than Low Rights mode
Why do you keep capitalizing IE in sandboxie? It's nothing to do with IE.
Say some escalation exploit is used, the exploit code has direct access registry, files on the system. Sandboxie avoids that entirely because the environment is virtualized too. It also does not suffer vulnerability issue where a plugin can effect the entire system (like the Java applet exploits that effect Chrome too).
So far, from your response, I don't think you researched the software at all.
frankly I haven't seen a single infection on any customer's PCs that use it
Says the experienced IT guy that doesn't know how to use "System Center Configuration Management" trivially. Yeah, I don't think I'll trust your 'security' audits, I actually doubt you do them.
Oh and FYI but if you just absolutely positively have to run FF for some reason
I don't care what browser is being used, I find it ridiculous to be concerned about browser security and then to not actually implement something like sandboxie, considering the attack vectors are still completely capable via commonly used plugins, especially when you're bringing in users that you imply through your use of the words 'any home and SMB user' are not technically literate and therefore likely to click 'yes' to various security prompts despite the dangers.