Below you will find the commands we used to enable the sys-usb VM (on an installation of Qubes 3.2 where it was not enabled by default nor was the task of handling USB devices assigned to sys-net).
On dom0 terminal emulator, we executed the following first to enable sys-usb.
1
2
sudoqubesctl top.enableqvm.sys-usb;
sudoqubesctl state.highstate;
Then we modified the configuration files for the mouse (/etc/qubes-rpc/policy/qubes.InputMouse) and keyboard (/etc/qubes-rpc/policy/qubes.InputKeyboard) so that they will automatically be granted to dom0 without prompting the used each time.
We modified the content /etc/qubes-rpc/policy/qubes.InputMouse and /etc/qubes-rpc/policy/qubes.InputKeyboard to be as below:
A couple of days ago we decided to give Qubes OS a go and see what it could do for a regular user. The installation was easy as it uses the same installer as Fedora, so we just created a live USB and formatted a laptop that had built in…
Recently, we needed to increase the size of the root image for the fedora-23 TemplateVM. We had to do this as we wanted to install in /opt a few IDEs, including android-studio which takes a lot of space when accompanied by the Android SDK. Following the excellent guide at https://www.qubes-os.org/doc/resize-root-disk-image/,…
Based on the following resources, we were able to create a Windows 7 64bit virtual machine on our Qubes OS 3.2 installation. Creating and using HVM (fully virtualized) domains Installing and using Windows-based AppVMs Cannot install Windows 7 HVM unless "cirrus" driver is used #2488 The following steps are to…