qubes-doc/user/downloading-installing-upgr.../installation-guide.md

476 lines
20 KiB
Markdown
Raw Normal View History

2010-04-06 21:08:14 +00:00
---
lang: en
2015-04-10 20:17:45 +00:00
layout: doc
permalink: /doc/installation-guide/
redirect_from:
- /en/doc/installation-guide/
2021-06-18 13:35:43 +00:00
- /doc/InstallationGuide/
- /wiki/InstallationGuide/
- /doc/InstallationGuideR1/
- /doc/InstallationGuideR2B1/
- /doc/InstallationGuideR2B2/
- /doc/InstallationGuideR2B3/
- /doc/InstallationGuideR2rc1/
- /doc/InstallationGuideR2rc2/
- /doc/InstallationGuideR3.0rc1/
- /doc/InstallationGuideR3.0rc2/
- /doc/live-usb/
ref: 153
2021-06-18 13:35:43 +00:00
title: Installation Guide
2010-04-06 21:08:14 +00:00
---
2021-06-18 13:35:43 +00:00
Welcome to the Qubes OS installation guide! This guide will walk you through
the process of installing Qubes. Please read it carefully and thoroughly, as it
contains important information for ensuring that your Qubes OS installation is
2021-06-18 13:25:06 +00:00
functional and secure.
2021-06-18 13:35:43 +00:00
## Pre-installation
2021-06-18 13:35:43 +00:00
### Hardware requirements
<div class="alert alert-danger" role="alert">
<i class="fa fa-exclamation-triangle"></i>
2021-06-18 13:35:43 +00:00
<b>Warning:</b> Qubes has no control over what happens on your computer
before you install it. No software can provide security if it is installed on
compromised hardware. Do not install Qubes on a computer you don't trust.
See <a href="/doc/install-security/">installation security</a> for more information.
</div>
2021-06-18 13:35:43 +00:00
Qubes OS has very specific [system requirements](/doc/system-requirements/). To
ensure compatibility, we strongly recommend using [Qubes-certified
hardware](/doc/certified-hardware/). Other hardware may require you to perform
significant troubleshooting. You may also find it helpful to consult the
[Hardware Compatibility List](/hcl/).
Even on supported hardware, you must ensure that [IOMMU-based
virtualization](https://en.wikipedia.org/wiki/Input%E2%80%93output_memory_management_unit#Virtualization)
is activated in the BIOS. Without it, Qubes OS won't be able to enforce
isolation. For Intel-based boards, this setting is called Intel Virtualization
for Directed I/O (**Intel VT-d**) and for AMD-based boards, it is called AMD
I/O Virtualization Technology (or simply **AMD-Vi**). This parameter should be
activated in your computer's BIOS, alongside the standard Virtualization
(**Intel VT-x**) and AMD Virtualization (**AMD-V**) extensions. This [external
2021-06-18 13:25:06 +00:00
guide](https://web.archive.org/web/20200112220913/https://www.intel.in/content/www/in/en/support/articles/000007139/server-products.html)
2021-06-18 13:35:43 +00:00
made for Intel-based boards can help you figure out how to enter your BIOS to
locate and activate those settings. If those settings are not nested under the
Advanced tab, you might find them under the Security tab.
<div class="alert alert-warning" role="alert">
<i class="fa fa-exclamation-circle"></i>
2021-06-18 13:35:43 +00:00
<b>Note:</b> Qubes OS is not meant to be installed inside a virtual machine
as a guest hypervisor. In other words, <b>nested virtualization</b> is not
supported. In order for a strict compartmentalization to be enforced, Qubes
OS needs to be able to manage the hardware directly.
</div>
2021-06-18 13:35:43 +00:00
### Copying the ISO onto the installation medium
2021-06-18 13:35:43 +00:00
Start by [downloading](/downloads/) a Qubes ISO.
<div class="alert alert-danger" role="alert">
<i class="fa fa-exclamation-triangle"></i>
2021-06-18 13:35:43 +00:00
<b>Warning:</b> Any file you download from the internet could be malicious,
even if it appears to come from a trustworthy source. Our philosophy is to <a
2021-06-18 13:25:06 +00:00
href="/faq/#what-does-it-mean-to-distrust-the-infrastructure">distrust the
2021-06-18 13:35:43 +00:00
infrastructure</a>. Regardless of how you acquire your Qubes ISO, <a
2021-06-18 13:25:06 +00:00
href="/security/verifying-signatures/">verify its authenticity</a> before
continuing.
</div>
2021-06-18 13:35:43 +00:00
Once the ISO has been verified as authentic, you should copy it onto the
installation medium of your choice, such as a dual-layer DVD, a Blu-ray disc,
or a USB drive. The size of each Qubes ISO is available on the
2021-06-18 13:25:06 +00:00
[downloads](/downloads/) page by hovering over the download button.
<div class="alert alert-warning" role="alert">
<i class="fa fa-exclamation-circle"></i>
2021-06-18 13:35:43 +00:00
<b>Note:</b> There are important <a href="/doc/install-security/">security
2021-06-18 13:25:06 +00:00
considerations</a> to keep in mind when choosing an installation medium.
</div>
<div class="alert alert-danger" role="alert">
<i class="fa fa-exclamation-triangle"></i>
2021-06-18 13:35:43 +00:00
<b>Warning:</b> Be careful to choose the correct device when copying the ISO,
or you may lose data. We strongly recommended making a full backup before
2021-06-18 13:25:06 +00:00
modifying any devices.
</div>
2021-06-18 13:35:43 +00:00
If you choose to use a USB drive, copy the ISO onto the USB device, e.g. using
2021-06-18 13:25:06 +00:00
`dd`:
```
2021-06-18 13:35:43 +00:00
$ sudo dd if=Qubes-RX-x86_64.iso of=/dev/sdY status=progress bs=1048576 && sync
```
2021-06-18 13:35:43 +00:00
Change `Qubes-RX-x86_64.iso` to the filename of the version you're installing,
and change `/dev/sdY` to the correct target device e.g., `/dev/sdc`). Make sure
2021-06-18 13:25:06 +00:00
to write to the entire device (e.g., `/dev/sdc`) rather than just a single
partition (e.g., `/dev/sdc1`).
2021-06-18 13:35:43 +00:00
On Windows, you can use the [Rufus](https://rufus.akeo.ie/) tool to write the
ISO to a USB key. MediaTest is not recommended. Be sure to select "DD image"
mode (*after* selecting the Qubes ISO):
<div class="alert alert-warning" role="alert">
<i class="fa fa-exclamation-circle"></i>
2021-06-18 13:35:43 +00:00
<b>Note:</b> If you do this on Windows 10, you can only install Qubes
without MediaTest, which is not recommended.
</div>
2021-06-18 13:35:43 +00:00
![Rufus menu](/attachment/doc/rufus-menu.png)
2021-06-18 13:35:43 +00:00
![Rufus DD image mode](/attachment/doc/rufus-dd-image-mode.png)
2019-05-26 23:45:38 +00:00
2021-06-18 13:35:43 +00:00
If you are an advanced user, and you would like to customize your installation,
please see [custom installation](/doc/custom-install/). Otherwise, follow the
2021-06-18 13:25:06 +00:00
instructions below.
2021-06-18 13:35:43 +00:00
## Installation
2021-06-18 13:35:43 +00:00
This section will demonstrate a simple installation using mostly default
2021-06-18 13:25:06 +00:00
settings.
2021-06-18 13:35:43 +00:00
### Getting to the boot screen
2021-06-18 13:35:43 +00:00
Just after you power on your machine, make the Qubes OS medium available to the
computer by inserting your DVD or USB drive. Shortly after the Power-on
self-test (POST) is completed, you should be greeted with the Qubes OS boot
2021-06-18 13:25:06 +00:00
screen.
2021-06-18 13:35:43 +00:00
![Boot screen](/attachment/doc/boot-screen.png)
<div class="alert alert-info" role="alert">
<i class="fa fa-info-circle"></i>
2021-06-18 13:35:43 +00:00
<b>Note:</b> When installing Qubes OS 4.0 on UEFI, there is intentionally no
boot menu. It goes straight to the installer. The boot menu will be back in
Qubes OS 4.1.
</div>
2021-06-18 13:35:43 +00:00
From here, you can navigate the boot screen using the arrow keys on your
keyboard. Pressing the "Tab" key will reveal options. You can choose one of
2021-06-18 13:25:06 +00:00
three options:
2021-06-18 13:35:43 +00:00
* Install Qubes OS
* Test this media and install Qubes OS
* Troubleshooting
2021-06-18 13:35:43 +00:00
Select the option to test this media and install Qubes OS.
2021-06-18 13:35:43 +00:00
If the boot screen does not appear, there are several options to troubleshoot.
First, try rebooting your computer. If it still loads your currently installed
2021-06-18 13:25:06 +00:00
operating system or does not detect your installation medium, make sure the
2021-06-18 13:35:43 +00:00
boot order is set up appropriately. The process to change the boot order varies
2021-06-18 13:25:06 +00:00
depending on the currently installed system and the motherboard manufacturer.
2021-06-18 13:35:43 +00:00
If **Windows 10** is installed on your machine, you may need to follow specific
instructions to change the boot order. This may require an [advanced
2021-06-18 13:25:06 +00:00
reboot](https://support.microsoft.com/en-us/help/4026206/windows-10-find-safe-mode-and-other-startup-settings).
2021-06-18 13:35:43 +00:00
After the POST, you may have a chance to choose a boot device. You may wish to
select the USB drive or DVD drive as a temporary boot option so that the next
2021-06-18 13:25:06 +00:00
time you boot, your internal storage device will be selected first.
2021-06-18 13:35:43 +00:00
![Boot order](/attachment/doc/boot-order.png)
2021-06-18 13:35:43 +00:00
### The installer home screen
2021-06-18 13:35:43 +00:00
On the first screen, you are asked to select the language that will be used
during the installation process. When you are done, select **Continue**.
2021-06-18 12:46:02 +00:00
![welcome](/attachment/doc/welcome-to-qubes-os-installation-screen.png)
2021-06-18 13:35:43 +00:00
Prior to the next screen, a compatibility test runs to check whether
IOMMU-virtualization is active or not. If the test fails, a window will pop up.
2021-06-18 13:35:43 +00:00
![Unsupported hardware detected](/attachment/doc/unsupported-hardware-detected.png)
2021-06-18 13:35:43 +00:00
Do not panic. It may simply indicate that IOMMU-virtualization hasn't been
activated in the BIOS. Return to the [hardware
requirements](#hardware-requirements) section to learn how to activate it. If
2021-06-18 13:25:06 +00:00
the setting is not configured correctly, it means that your hardware won't be
2021-06-18 13:35:43 +00:00
able to leverage some Qubes security features, such as a strict isolation of
the networking and USB hardware.
2021-06-18 13:35:43 +00:00
If the test passes, you will reach the installation summary screen. The
installer loads Xen right at the beginning. If you can see the installer's
2021-06-18 13:25:06 +00:00
graphical screen, and you pass the compatibility check that runs immediately
2021-06-18 13:35:43 +00:00
afterward, Qubes OS is likely to work on your system!
2021-06-18 13:35:43 +00:00
Like Fedora, Qubes OS uses the Anaconda installer. Those that are familiar with
RPM-based distributions should feel at home.
2021-06-18 13:35:43 +00:00
### Installation summary
<div class="alert alert-success" role="alert">
<i class="fa fa-check-circle"></i>
2021-06-18 13:35:43 +00:00
<b>Did you know?</b> The Qubes OS installer is completely offline. It doesn't
2021-06-18 13:25:06 +00:00
even load any networking drivers, so there is no possibility of
internet-based data leaks or attacks during the installation process.
</div>
2021-06-18 13:35:43 +00:00
The Installation summary screen allows you to change how the system will be
installed and configured, including localization settings. At minimum, you are
required to select the storage device on which Qubes OS will be installed.
2021-06-18 13:35:43 +00:00
![Installation summary not ready](/attachment/doc/installation-summary-not-ready.png)
2021-06-18 13:35:43 +00:00
### Localization
2021-06-18 13:35:43 +00:00
Let's assume you wish to add a German keyboard layout. Go to Keyboard Layout,
press the "Plus" symbol, search for "German" as indicated in the screenshot and
press "Add". If you want it be your default language, select the "German" entry
in the list and press the arrow button. Click on "Done" in the upper left
2021-06-18 13:25:06 +00:00
corner, and you're ready to go!
2021-06-18 13:35:43 +00:00
![Keyboard layout selection](/attachment/doc/keyboard-layout-selection.png)
2021-06-18 13:35:43 +00:00
The process to select a new language is similar to the process to select a new
keyboard layout. Follow the same process in the "Language Support" entry.
2021-06-18 13:35:43 +00:00
![Language support selection](/attachment/doc/language-support-selection.png)
2021-06-18 13:35:43 +00:00
You can have as many keyboard layout and languages as you want. Post-install,
2021-06-18 13:25:06 +00:00
you will be able to switch between them and install others.
2021-06-18 13:35:43 +00:00
Don't forget to select your time and date by clicking on the Time & Date entry.
2021-06-18 13:35:43 +00:00
![Time and date](/attachment/doc/time-and-date.png)
2021-06-18 13:35:43 +00:00
### Software
2021-06-18 13:35:43 +00:00
![Add-ons](/attachment/doc/add-ons.png)
2021-06-18 13:35:43 +00:00
On the software selection tab, you can choose which software to install in
Qubes OS. Two options are available:
2021-06-18 13:35:43 +00:00
* **Debian:** Select this option if you would like to use
[Debian](/doc/templates/debian/) qubes in addition to the default Fedora
2021-06-18 13:25:06 +00:00
qubes.
2021-06-18 13:35:43 +00:00
* **Whonix:** Select this option if you would like to use
[Whonix](https://www.whonix.org/wiki/Qubes) qubes. Whonix allows you to use
2021-06-18 13:35:43 +00:00
[Tor](https://www.torproject.org/) securely within Qubes.
2021-06-18 13:35:43 +00:00
Whonix lets you route some or all of your network traffic through Tor for
greater privacy. Depending on your threat model, you may need to install Whonix
2021-06-18 13:25:06 +00:00
templates right away.
2021-06-18 13:35:43 +00:00
Regardless of your choices on this screen, you will always be able to install
these and other [templates](/doc/templates/) later. If you're short on disk
2021-06-18 13:25:06 +00:00
space, you may wish to deselect these options.
2021-06-18 13:35:43 +00:00
By default, Qubes OS comes preinstalled with the lightweight Xfce4 desktop
environment. Other desktop environments will be available to you after the
2021-06-18 13:25:06 +00:00
installation is completed, though they may not be officially supported (see
2021-06-18 13:35:43 +00:00
[Advanced Topics](/doc/#advanced-topics)).
2021-06-18 13:35:43 +00:00
Press **Done** to go back to the installation summary screen.
2021-06-18 13:35:43 +00:00
### Installation destination
2021-06-18 13:35:43 +00:00
Under the System section, you must choose the installation destination. Select
the storage device on which you would like to install Qubes OS.
<div class="alert alert-danger" role="alert">
<i class="fa fa-exclamation-triangle"></i>
2021-06-18 13:35:43 +00:00
<b>Warning:</b> Be careful to choose the correct installation target, or you
may lose data. We strongly recommended making a full backup before
2021-06-18 13:25:06 +00:00
proceeding.
</div>
2021-06-18 13:35:43 +00:00
Your installation destination can be an internal or external storage drive,
such as an SSD, HDD, or USB drive. The installation destination must have a
least 32 GiB of free space available.
<div class="alert alert-warning" role="alert">
<i class="fa fa-exclamation-circle"></i>
2021-06-18 13:35:43 +00:00
<b>Note:</b> The installation destination cannot be the same as the
installation medium. For example, if you're installing Qubes OS <em>from</em>
a USB drive <em>onto</em> a USB drive, they must be two distinct USB drives,
and they must both be plugged into your computer at the same time. (Note:
This may not apply to advanced users who partition their devices
2021-06-18 13:25:06 +00:00
appropriately.)
</div>
2021-06-18 13:35:43 +00:00
Installing an operating system onto a USB drive can be a convenient way to try
Qubes. However, USB drives are typically much slower than internal SSDs. We
recommend a very fast USB 3.0 drive for decent performance. Please note that a
minimum storage of 32 GiB is required. If you want to install Qubes OS onto a
USB drive, just select the USB device as the target installation device. Bear
2021-06-18 13:25:06 +00:00
in mind that the installation process is likely to take longer than it would on
an internal storage device.
2021-06-18 13:35:43 +00:00
![Select storage device](/attachment/doc/select-storage-device.png)
<div class="alert alert-success" role="alert">
<i class="fa fa-check-circle"></i>
2021-06-18 13:35:43 +00:00
<b>Did you know?</b> Qubes OS uses full-disk AES encryption (FDE) via LUKS by
2021-06-18 13:25:06 +00:00
default.
</div>
2021-06-18 13:35:43 +00:00
As soon as you press **Done**, the installer will ask you to enter a passphrase
for disk encryption. The passphrase should be complex. Make sure that your
keyboard layout reflects what keyboard you are actually using. When you're
finished, press **Done**.
<div class="alert alert-danger" role="alert">
<i class="fa fa-exclamation-triangle"></i>
2021-06-18 13:35:43 +00:00
<b>Warning:</b> If you forget your encryption passphrase, there is no way to
2021-06-18 13:25:06 +00:00
recover it.
</div>
2021-06-18 13:35:43 +00:00
![Select storage passhprase](/attachment/doc/select-storage-passphrase.png)
2021-06-18 13:35:43 +00:00
When you're ready, press **Begin Installation**.
2021-06-18 13:35:43 +00:00
![Installation summary ready](/attachment/doc/installation-summary-ready.png)
2021-06-18 13:35:43 +00:00
### Create your user account
2021-06-18 13:35:43 +00:00
While the installation process is running, you can create your user account.
This is what you'll use to log in after disk decryption and when unlocking the
screen locker. This is a purely local, offline account in dom0. By design,
Qubes OS is a single-user operating system, so this is just for you.
2021-06-18 13:35:43 +00:00
Select **User Creation** to define a new user with administrator privileges and
a password. Just as for the disk encryption, this password should be complex.
The root account is deactivated and should remain as such.
2021-06-18 13:35:43 +00:00
![Account name and password](/attachment/doc/account-name-and-password.png)
2021-06-18 13:35:43 +00:00
When the installation is complete, press **Reboot**. Don't forget to remove the
2021-06-18 13:25:06 +00:00
installation medium, or else you may end up seeing the installer boot screen
again.
2021-06-18 13:35:43 +00:00
## Post-installation
2021-06-18 13:35:43 +00:00
### First boot
2021-06-18 13:35:43 +00:00
If the installation was successful, you should now see the GRUB menu during the
2021-06-18 13:25:06 +00:00
boot process.
2021-06-18 13:35:43 +00:00
![Grub boot menu](/attachment/doc/grub-boot-menu.png)
2021-06-18 13:35:43 +00:00
Just after this screen, you will be asked to enter your encryption passphrase.
2021-06-18 13:35:43 +00:00
![Unlock storage device screen](/attachment/doc/unlock-storage-device-screen.png)
2021-06-18 13:35:43 +00:00
### Initial Setup
2021-06-18 13:35:43 +00:00
You're almost done. Before you can start using Qubes OS, some configuration is
2021-06-18 13:25:06 +00:00
needed.
2021-06-18 13:35:43 +00:00
![Initial setup menu](/attachment/doc/initial-setup-menu.png)
2021-06-18 13:35:43 +00:00
By default, the installer will create a number of qubes (depending on the
options you selected during the installation process). These are designed to
2021-06-18 13:25:06 +00:00
give you a more ready-to-use environment from the get-go.
2021-06-18 13:35:43 +00:00
![Initial setup menu configuration](/attachment/doc/initial-setup-menu-configuration.png)
2021-06-18 13:35:43 +00:00
Let's briefly go over the options:
2021-06-18 13:35:43 +00:00
* **Create default system qubes:**
These are the core components of the system, required for things like
2021-06-18 13:25:06 +00:00
internet access.
2021-06-18 13:35:43 +00:00
* **Create default application qubes:**
These are how you compartmentalize your digital life. There's nothing special
about the ones the installer creates. They're just suggestions that apply to
most people. If you decide you don't want them, you can always delete them
2021-06-18 13:25:06 +00:00
later, and you can always create your own.
2021-06-18 13:35:43 +00:00
* **Create Whonix Gateway and Workstation qubes:**
If you want to use Whonix, you should select this option.
2021-07-05 12:35:57 +00:00
* **Enabling system and template updates over the Tor anonymity network using
Whonix:**
2021-06-18 13:35:43 +00:00
If you select this option, then whenever you install or update software in
dom0 or a template, the internet traffic will go through Tor.
* **Create USB qube holding all USB controllers:**
Just like the network qube for the network stack, the USB qube isolates the
USB controllers.
* **Use sys-net qube for both networking and USB devices:**
You should select this option if you rely on a USB device for network access,
such as a USB modem or a USB Wi-Fi adapter.
* **Do not configure anything:**
2021-06-18 13:25:06 +00:00
This is for very advanced users only. If you select this option, you'll have
to set everything up manually afterward.
2021-06-18 13:25:06 +00:00
When you're satisfied with you choices, press **Done**. This configuration
process may take a while, depending on the speed and compatibility of your
system.
2021-06-18 13:25:06 +00:00
After the configuration is done, you will be greeted by the login screen. Enter
your password and log in.
2021-06-18 12:46:02 +00:00
![Login screen](/attachment/doc/login-screen.png)
Congratulations, you are now ready to use Qubes OS!
2021-06-18 12:46:02 +00:00
![Desktop menu](/attachment/doc/desktop-menu.png)
## Next steps
### Updating
2020-08-31 20:39:30 +00:00
2021-06-18 13:25:06 +00:00
Next, [update](/doc/how-to-update/) your installation to ensure you have
the latest security updates. Frequently updating is one of the best ways to
remain secure against new threats.
2020-08-31 20:39:30 +00:00
### Security
2021-06-18 13:25:06 +00:00
The Qubes OS Project occasionally issues [Qubes Security Bulletins
2021-06-22 17:50:12 +00:00
(QSBs)](/security/qsb/) as part of the [Qubes Security Pack
2021-06-18 13:25:06 +00:00
(qubes-secpack)](/security/pack/). It is important to make sure that you
receive all QSBs in a timely manner so that you can take action to keep your
system secure. (While [updating](#updating) will handle most security needs,
there may be cases in which additional action from you is required.) For this
reason, we strongly recommend that every Qubes user subscribe to the
[qubes-announce](/support/#qubes-announce) mailing list.
In addition to QSBs, the Qubes OS Project also publishes
2021-06-22 17:55:21 +00:00
[Canaries](/security/canary/), XSA summaries, template releases and
2021-06-18 13:25:06 +00:00
end-of-life notices, and other items of interest to Qubes users. Since these
are not essential for all Qubes users to read, they are not sent to
[qubes-announce](/support/#qubes-announce) in order to keep the volume on that
list low. However, we expect that most users, especially novice users, will
find them helpful. If you are interested in these additional items, we
encourage you to subscribe to the [Qubes News RSS feed](/feed.xml) or join one
of our other [venues](/support/), where these news items are also announced.
For more information about Qubes OS Project security, please see the [security
center](/security/).
### Backups
2020-08-31 20:39:30 +00:00
2021-06-18 13:25:06 +00:00
It is extremely important to make regular backups so that you don't lose your
data unexpectedly. The [Qubes backup
system](/doc/how-to-back-up-restore-and-migrate/) allows you to do this
securely and easily.
2020-08-31 20:39:30 +00:00
### Submit your HCL report
2021-06-18 13:25:06 +00:00
Consider giving back to the Qubes community and helping other users by
[generating and submitting a Hardware Compatibility List (HCL)
report](/doc/hcl/#generating-and-submitting-new-reports).
### Get Started
Find out [Getting Started](/doc/getting-started/) with Qubes, check out
the other [How-To Guides](/doc/#how-to-guides), and learn about
2021-06-18 13:25:06 +00:00
[Templates](/doc/#templates).
## Getting help
2021-06-18 13:25:06 +00:00
* We work very hard to make the [documentation](/doc/) accurate, comprehensive
useful and user friendly. We urge you to read it! It may very well contain
the answers to your questions. (Since the documentation is a community
effort, we'd also greatly appreciate your help in
[improving](/doc/how-to-edit-the-documentation/) it!)
2016-03-10 00:23:49 +00:00
2021-06-18 13:25:06 +00:00
* If issues arise during installation, see the [Installation
Troubleshooting](/doc/installation-troubleshooting) guide.
2021-06-18 13:25:06 +00:00
* If you don't find your answer in the documentation, please see [Help,
Support, Mailing Lists, and Forum](/support/) for places to ask.
2021-06-18 13:25:06 +00:00
* Please do **not** email individual members of the Qubes team with questions
about installation or other problems. Instead, please see [Help, Support,
Mailing Lists, and Forum](/support/) for appropriate places to ask questions.