In this hour you explored the architecture and concept of sandboxed solutions. You also learned how sandboxed solutions can be deployed, monitored, and administered. You learned how to develop a full trust proxy and how to break the boundaries of a sandbox using the same. Finally you learned about solution validators, which enable administrators to prevent activation of any rogue solutions and thus proactively safeguard the farm against bad code.