Below you will find the commands we used to enable the sys-usb VM (on an installation of Qubes 3.2 where it was not enabled by default nor was the task of handling USB devices assigned to sys-net).
On dom0 terminal emulator, we executed the following first to enable sys-usb.
sudo qubesctl top.enable qvm.sys-usb; sudo qubesctl state.highstate;
Then we modified the configuration files for the mouse (/etc/qubes-rpc/policy/qubes.InputMouse) and keyboard (/etc/qubes-rpc/policy/qubes.InputKeyboard) so that they will automatically be granted to dom0 without prompting the used each time.
We modified the content /etc/qubes-rpc/policy/qubes.InputMouse and /etc/qubes-rpc/policy/qubes.InputKeyboard to be as below:
sys-usb dom0 allow,user=root $anyvm $anyvm deny
This post is also available in: Greek


