This commit is contained in:
Dr. Gerhard Weck 2025-07-30 11:17:22 +02:00 committed by GitHub
commit 54eeacccc4
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
4 changed files with 1130 additions and 5 deletions

View file

@ -0,0 +1,36 @@
=======================================
Migrating Windows qubes to Qubes OS 4.1
=======================================
For Windows 7, 10, and 11, there is a way to migrate backups created under Qubes R4.1 to R4.2. For this, a backup must be created under R4.1, and this backup has to be restored under Qubes R4.2, resulting in a VM well integrated into Qubes R4.2. If ``qvm-features <VMname> audio-model ich6`` is set, Windows will even have audio, although for Windows 10 and 11, it is somewhat scratchy.
Preparation
-----------
While this is somewhat straightforward, things get difficult if QWT 4.1.68-1 (or earlier) was installed in the VM. Prior to creating the backup, this old version has to be removed, which can be quite tricky for Windows 10 and 11. Otherwise, the restored backup will probably not start or run under Qubes R4.2, because this QWT version is incompatible with R4.2.
To uninstall the installed QWT version, proceed as described in the :doc:`QWT installation documentation for R4.2 </user/templates/windows/qubes-windows-tools-4-1#Uninstalling Qubes Windows Tools (QWT) in a Windows VM>`
Transferring the Windows Qube
-----------------------------
- Now, the backup for R4.2 may be created.
- This backup can be installed in Qubes R4.2 and will (probably) work.
- If Qubes Windows Tools was installed under R4.1, the new version for R4.2 can then be installed as described in the documentation.
**Note:** The Qubes application menus for the newly restored Windows qubes will be empty, but can be easily restored vai the Qube Meanager or by issuing the command ``qubes-sync-appmenus`` in ``dom0``.
Migration to Qubes R4.3
-----------------------
As the current new QWT version was developed primarily for Qubes R4.3, it is compatible with the version of Qubes. So, a Windows VM running under Qubes R4.2 should be transferrable to R4.3 via backup/restore, without the need to remove and reinstall Qubes Windows Tools. At least, for the current pre-release of Qubes R4.3, this is possible. Currently, however, the new Qubes graphics driver is still very buggy in Qubes4.3, so it is better not to use it, especially since seamless mode is there quite unrliable and changing the screen resolution will put the VM into an unusable state.

View file

@ -0,0 +1,668 @@
=========================
Qubes Windows Tools (QWT)
=========================
**Note:** *As there is currently no officially supported version, of Qubes Windows Tools, the following instructions describe a workaround to get QWT functionality using an old and a preliminarary version of QWT. When a new officially supported version will be made available, the following desription has to be updated accordingly.*
Qubes Windows Tools (QWT) are a set of programs and drivers that provide integration of Windows 7, 10, and 11 Standalone, TemplateVMs, and AppVMs with the rest of the Qubes system. They contain several components that can be enabled or disabled during installation, and rely on specific functions of Qubes which support this integration:
- **Shared components (required)** - common libraries used by QWT components
- **Qubes GUI Agent** - video driver and GUI agent that enable the seamless GUI mode that integrates Windows apps onto the common Qubes trusted desktop (currently only for Windows 7 and, in a preliminary version, for Windows 11)
- **Disable UAC** - User Account Control may interfere with QWT and doesn't really provide any additional benefits in Qubes environment
- **Clipboard sender/receiver** - Support for :doc:`secure clipboard copy/paste </user/how-to-guides/how-to-copy-and-paste-text>` between the Windows VM and other AppVMs
- **File sender/receiver** - Support for :doc:`secure file exchange </user/how-to-guides/how-to-copy-and-move-files>` between the Windows VM and other AppVMs
- **Xen PV drivers** - drivers for the virtual hardware exposed by Xen for Windows that increase performance compared to QEMU emulated devices and are required for attaching USB devices
- Base Xen PV Drivers (required): paravirtual bus and interface drivers
- Xen PV Disk Drivers: paravirtual storage drivers
- Xen PV Network Drivers: paravirtual network drivers
- Move user profiles: user profile directory (``C:\users``) is moved to VMs private disk backed by ``private.img file`` in ``dom0`` (useful mainly for HVM templates).
- **Qubes Core Agent** (part of Qubes) - Needed for proper integration with Qubes as well as for ``qvm-run`` and generic ``qrexec`` for the Windows VM (e.g. ability to run custom service within/from the Windows VM)
- **Copy/Edit in Disposable VM** (part of Qubes) - Support for editing files in DisposableVMs
- **Audio** - Audio support is available even without QWT installation if ``qvm-features audio-model`` is set as ``ich6``
**Note:** Due to the security problems described in `QSB-091 <https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-091-2023.txt>`__, installation of Qubes Windows Tools is currently blocked. Instead, a text file containing a warning is displayed. Currently, it is difficult to estimate the severity of the risks posed by the sources of the Xen drivers used in QWT possibly being compromised, so it was decided not to offer direct QWT installation until this problem could be treated properly. While Windows qubes are, in Qubes, generally not regarded as being very trustworthy, a possible compromise of the Xen drivers used in Qubes Windows Tools might create a risk for Xen or `dom0` and thus be dangerous for Qubes itself. This risk may be small or even non-existent, as stated in QSB-091. If you **understand** this risk and are **willing to take it**, you can still install the previous version of Qubes Windows Tools **for Windows 7**, which will work for Windows 7, but not for Windows 10 or 11.
**For Windows 10 or 11**, currently, there is no official, final QWT version available, but for Qubes R4.3, a preliminary testing version has been developed and can be used in Qubes R4.2. This version is not subject to the security problems stated above, but it should be noted that it is not yet in its final, debugged state and so may still show some errors. For Windows 11, all QWT functionality is available and works quite satisfactorily, including seamless mode support. For Windows 10, the new Qubes graphics driver is not yet compatible with Windows and should not be installed, as it will likely cause the Windows installation to break and render it unusable.
**Note**: If you choose to move profiles, drive letter ``Q:`` must be assigned to the secondary (private) disk.
**Note**: Xen PV disk drivers are not installed by default. This is because they seem to cause problems (BSOD = Blue Screen Of Death). We're working with upstream devs to fix this. **However**, the BSOD seems to only occur after the first boot, and everything works fine after that. **Enable the drivers at your own risk**, of course, but we welcome reports of success/failure in any case (backup your VM first!). With disk PV drivers absent, ``qvm-block`` will not work for the VM, but you can still use standard Qubes inter-VM file copying mechanisms. On the other hand, the Xen PV drivers allow USB device access even without QWT installation if ``qvm-features stubdom-qrexec`` is set as ``1``.
Below is a breakdown of the feature availability depending on the Windows version (only x64):
.. list-table::
:widths: 30 30 30 30
:align: center
:header-rows: 1
* - Feature
- Windows 7
- Windows 10
- Windows 11
* - Qubes Video Driver
- y
- n
- y
* - Qubes Network Setup
- y
- y
- y
* - Private Volume Setup (move profiles)
- y
- y
- y
* - File sender/receiver
- y
- y
- y
* - Clipboard Copy/Paste
- y
- y
- y
* - Application shortcuts
- y
- y
- y
* - Copy/Edit in Disposable VM
- y
- y
- y
* - Block device
- y
- y
- y
* - USB device
- y
- y
- y
* - Audio
- y
- y
- y
Qubes Windows Tools are open source and are distributed under a GPL license.
**Notes:**
- Currently, only 64-bit versions of Windows 7, 10, and 11 are supported by Qubes Windows Tools. Only the emulated SVGA GPU is supported (although `there have been reports <https:///groups.google.com/forum/#!topic/qubes-users/cmPRMOkxkdA>`__ on working GPU passthrough).
- This page documents the process of installing Qubes Windows Tools in version **R4.2**.
- *In testing VMs only* it's probably a good idea to install a VNC server before installing QWT. If something goes very wrong with the Qubes GUI agent, a VNC server should still allow access to the OS.
- As several of the installation steps described below may cause errors, the Windows VM where Qubes Windows Tools are installed should be cloned before starting the installation.
Preparation
-----------
Before proceeding with the installation, we need to disable the Windows mechanism that allows only signed drivers to be installed, because currently, the drivers provided as part of the Windows Tools are not digitally signed with a publicly recognizable certificate. To do that:
1. Start the command prompt as Administrator, i.e., right-click on the Command Prompt icon (All Programs -> Accessories) and choose "Run as administrator".
2. In the command prompt, type ``bcdedit /set testsigning on``
3. Reboot your Windows VM
Maybe in the future, this step will not be necessary anymore, because we will sign our drivers with a publicly verifiable certificate. However, it should be noted that even given the fact that those drivers are not digitally signed, this doesn't affect the security of the Windows VM in any way. This is because the actual installation `iso` file can be verified as described in step 3 below. The only downside of those drivers not being signed is the inconvenience to the user that he or she must disable the signature enforcement policy before installing the tools.
QWT relies on PowerShell scripts. If the execution policy defined for PowerShell is set to `Restricted`, execution of these scripts is blocked. Before QWT installation, this should be checked using the PowerShell command
.. code:: bash
PS C:\> Get-ExecutionPolicy
If script execution is blocked, it must be allowed using the following PowerShell command with administrator privileges:
.. code:: bash
PS C:\> Set-ExecutionPolicy Unrestricted
**Warning:** It is recommended to increase the default value of the Windows VMs ``qrexec_timeout`` property from 60 (seconds) to, for example, 300. During one of the first reboots after Windows Tools installation, Windows user profiles are moved onto the private VMs virtual disk (private.img), and this operation can take some time. Moving profiles and, later on, updating a Windows installation, is performed in an early boot phase when ``qrexec`` is not yet running, so a timeout may occur with the default value. To change the property use this command in ``dom0``: *(where* ``<VMname>`` *is the name of your Windows VM)*
.. code:: bash
[user@dom0 ~] $ qvm-prefs <VMname> qrexec_timeout 7200
**For Windows 10 and 11:** From the Windows command line, disable hibernation in order to avoid an incomplete Windows shutdown, which may lead to corruption of the VM's disk.
1. Start the command prompt as Administrator, i.e., right-click on the Command Prompt icon (All Programs -> Accessories) and choose "Run as administrator".
2. In the command prompt, type ``powercfg -H off``
3. Reboot your Windows VM
Additionally, these versions of Windows will not display the CD-ROM drive after starting the qube with
.. code:: bash
[user@dom0 ~] qvm-start vm --cdrom ...` or `qvm-start VMNAME --install-windows-tools
The solution is to disable hibernation in Windows with this command. (That command is included in QWTs setup, but its necessary to run it manually in order to be able to open QWTs setup ISO/CD-ROM in Windows).
Installing Windows OS as a Qubes VM
-----------------------------------
Please refer to :doc:`this page </user/templates/windows/windows-qubes>` for instructions on how to install Windows in a Qubes VM.
**Warning:** It is strongly suggested to enable autologon for any Windows HVMs that will have Qubes Tools installed. To do so, run the ``netplwiz`` command from the ``Win+R``/Start menu and uncheck the *Users must enter a user name and password to use this computer* option.
Installing Qubes Windows Tools (QWT) in a Windows VM
----------------------------------------------------
Installing the Qubes Windows Tools on Windows 7, 10, and 11, both as a StandaloneVM as well as a Template VM and a corresponding AppVM is described in the following sections.
**Note:** Seamless mode is currently not available for Windows 10 and 11. Please check the top of this document for the full feature availability breakdown.
1. First, make sure that ``qubes-windows-tools`` is installed in your system:
- For use with **Windows 7**, install the previous version of Qubes Windows Tools:
.. code:: bash
[user@dom0 ~] sudo qubes-dom0-update qubes-windows-tools-4.1.69
This will provide the .iso file to be presented as an installation drive to the Windows qube in step 2 of the QWT installation.
If you prefer to download the corresponding .rpm file for manual QWT installation for Windows 7, this is still available from the repositories (version `4.1.69-1 <https://yum.qubes-os.org/r4.2/current/dom0/fc37/rpm/qubes-windows-tools-4.1.69-1.fc37.noarch.rpm>`__ ).
- For use with **Windows 10 and 11**, you have to install the new, preliminary version 4.2.0 of Qubes Windows Tools. As this new QWT version is currently only provided in the testing area of Qubes R4.3, it has to be installed by downloading the .rpm file from the repository (version `4.2.0-1 <https://yum.qubes-os.org/r4.3/current-testing/dom0/fc41/rpm/qubes-windows-tools-4.2.0-1.fc41.noarch.rpm>`__ ).
After downloading, copy the file to `dom0` as described in `How to copy from dom0 <https://www.qubes-os.org/doc/how-to-copy-from-dom0/#copying-to-dom0>`__ and install it via ``sudo dnf install PATH_TO_RPMFILE``.
**Caution:** Installation of one of these QWT versions will remove the other one, if it is installed.
**Warning:** The older version of Qubes Windows Tools, and possibly the new version 4.2.0-1, too, will be replaced during the next `dom0` update by the current dummy version 4.1.70-1. This can be inhibited by appending the line `exclude=qubes-windows-tools` to the file `/etc/dnf/dnf.conf` in ``dom0``. But this will also stop any further QWT updates - so be sure to remove this line when - hopefully - a new fully functional version 4.2.1-1 of Qubes Windows Tools will be made available for Windows 10 and 11!!!
This package brings the ISO with Qubes Windows Tools that is passed to the VM when `--install-windows-tools` is specified for the ``qvm-start`` command. Please note that none of this software ever runs in ``dom0`` or any other part of the system except for the Windows AppVM in which it is to be installed. (it could not run in ``dom0`` at all, because ``dom0`` is a VM running under Fedora, while the QWT software is Windows software.)
2. To install the Qubes Windows Tools in a Windows VM one should start the VM passing the additional option ``--install-windows-tools``:
.. code:: bash
qvm-start <VMname> --install-windows-tools
Once the Windows VM boots, a CDROM should appear in the My Computer menu (typically as ``D:`` or ``E:``) with the setup program with the setup program ``qubes-tools-x64.msi`` for Windows 7 or ``qubes-tools-4.2.0.exe`` for Windows 10 and 11 in its main directory.
3. Install Qubes Windows Tools by starting the setup program (logged in as administrator), optionally selecting the ``Xen PV disk drivers``.
**Warning:** The installation of the PV disk drivers may lead Windows to declare that the hardware has changed and that, in consequence, the activation is no longer valid, possibly complaining that the use of the software is no longer lawful. It should be possible to reactivate the software if a valid product key is provided.
For installation in a template, you should select ``Move user profiles``.
|QWT_install_select|
Several times, Windows security may ask for confirmation of driver installation. Driver installation has to be allowed; otherwise the installation of Qubes Windows Tools will abort.
|QWT_install_driver|
If during installation, the Xen driver requests a reboot, select “No” and let the installation continue - the system will be rebooted later.
|QWT_install_no_restart|
4. After successful installation, the Windows VM must be shut down and started again, possibly a couple of times. On each shutdown, wait until the VM is really stopped, i.e. Qubes shows no more activity.
**For Windows 7:** If seamless mode is to be used, the Qubes graphics driver can now be installed, using a sequence of rather awkward operations:
- Start the Windows 7 VM.
- In the Windows device manager, you will probably find one or more unknown devices. Uninstall these devices.
- Reboot the VM.
- Now, using the appropriate Windows system management function, change the QWT installation, adding the Qubes graphics driver, but **do not** click on the “Finish” button in order to complete the installation.
- In the device manager, you will find a new display called “Qubes Video Driver”. Deactivate this device.
- Now, click on the “Finish” button to complete the QWT installation change.
- Reboot the VM.
- It may be necessary to start the GUI manually, by typing `qvm-start-gui VMNAME` in dom0.
- The device “Qubes Video Driver” may show up as deactivated. In this case, you can now activate it again.
- Changing the screen resolution for this VM probably will not work and may lead to a crash, so its better to avoid it. But you can start any program, e.g., the Windows Explorer. In the Qube manager, you can now select seamless mode for this VM, and it works!
- Shut down the Windows VM.
5. Qubes will automatically detect that the tools have been installed in the VM and will set appropriate properties for the VM, such as ``qrexec_installed``, ``guiagent_installed``, and ``default_user``. This can be verified (but is not required) using the ``qvm-prefs`` command (where ``<VMname>`` is the name of your Windows VM):
.. code:: bash
[user@dom0 ~] $ qvm-prefs <VMname>
To enable file copy operations to a Windows VM, the ``default_user`` property of this VM should be set to the ``<username>`` that you use to log in to the Windows VM. This can be done via the following command on a ``dom0`` terminal (where ``<VMname>`` is the name of your Windows VM):
.. code:: bash
[user@dom0 ~] $ qvm-prefs <VMname> default_user <username>
**Warning:** If this property is not set or set to a wrong value, files copied to this VM are stored in the folder ``C:\Windows\System32\config\systemprofile\Documents\QubesIncoming\<source_VM>``. If the target VM is an AppVM, this has the consequence that the files are stored in the corresponding TemplateVM and so are lost on AppVM shutdown.
6. It is advisable to set some other parameters in order to enable audio and USB block device access, synchronize the Windows clock with the Qubes clock, and so on:
.. code:: bash
[user@dom0 ~] $ qvm-features <VMname> audio-model ich9
[user@dom0 ~] $ qvm-features <VMname> stubdom-qrexec 1
[user@dom0 ~] $ qvm-features <VMname> timezone localtime
For audio, the parameter ``audio-model`` can be selected as ``ich6`` or ``ich9``; select the value that gives the best audio quality. Audio quality may also be improved by setting the following parameters, but this can depend on the Windows version and on your hardware:
.. code:: bash
[user@dom0 ~] $ qvm-features <VMname> timer-period 1000
[user@dom0 ~] $ qvm-features <VMname> out.latency 10000
[user@dom0 ~] $ qvm-features <VMname> out.buffer-length 4000
With the value ``localtime`` the dom0 ``timezone`` will be provided to virtual hardware, effectively setting the Windows clock to that of Qubes. With a digit value (negative or positive) the guest clock will have an offset (in seconds) applied relative to UTC.
7. Reboot Windows. If the VM starts, but does not show any window then shutdown Windows from the Qube manager, wait until it has really stopped, and reboot Windows once more.
8. Now the system should be up, with QWT running correctly.
9. **Windows 7 only:** Optionally enable seamless mode on VM startup. This can be done by setting appropriate values in the Windows registry:
- Start the command prompt as administrator, i.e. right click on the Command Prompt icon (All Programs -> Accessories) and choose “Run as administrator”
- In the command prompt type ``regedit``
- In the registry editor, position to the key ``\HKEY_LOCAL_MACHINE\Software\Invisible Things Lab\Qubes Tools\``
- Change the value ``SeamlessMode`` from 0 to 1
- Position to the key ``\HKEY_LOCAL_MACHINE\Software\Invisible Things Lab\Qubes Tools\qga\``
- Change the value ``SeamlessMode`` from 0 to 1
- Terminate the registry editor.
After the next boot, the VM will start in seamless mode. If Windows is used in a TemplateVM / AppVM combination, this registry fix has to be applied to the TemplateVM, as the ``HKLM`` registry key belongs to the template-based part of the registry.
Xen PV drivers and Qubes Windows Tools
--------------------------------------
Installing Xens PV drivers in the VM will lower its resources usage when using network and/or I/O intensive applications, but *may* come at the price of system stability (although Xens PV drivers on a Windows VM are usually very stable). They can be installed as an optional part of Qubes Windows Tools (QWT), which bundles Xens PV drivers.
**Notes** about using Xens VBD (storage) PV driver:
- **Windows 7:** Installing the driver requires a fully updated VM or else youll likely get a BSOD (“Blue Screen Of Death”) and a VM in a difficult to fix state. Updating Windows takes *hours* and for casual usage there isnt much of a performance between the disk PV driver and the default one; so there is likely no need to go through the lengthy Windows Update process if your VM doesnt have access to untrusted networks and if you dont use I/O intensive apps or attach block devices. If you plan to update your newly installed Windows VM it is recommended that you do so *before* installing Qubes Windows Tools. Installing the driver will probably cause Windows 7 activation to become invalid, but the activation can be restored using the Microsoft telephone activation method.
- The option to install the storage PV driver is disabled by default in Qubes Windows Tools
- In case you already had QWT installed without the storage PV driver and you then updated the VM, you may then install the driver by again starting the QWT installer and selecting the change option.
Using Windows AppVMs in seamless mode
-------------------------------------
Windows Apps can be started using the Qubes menu. Alternatively, you can open the Windows menu by typing the Windows key on your keyboard while the cursor is positioned in a window of the Windows VM.
**Note:** The following features are only available for Windows 7 and are still somewhat buggy in Windows 11.
Once you start a Windows-based AppVM with Qubes Tools installed, you can easily start individual applications from the VM (note the ``-a`` switch used here, which will auto-start the VM if it is not running):
.. code:: bash
[user@dom0 ~] $ qvm-run -a my-win-appvm explorer.exe
|windows-seamless-4.png| |windows-seamless-1.png|
Also, the inter-VM services work as usual e.g. to request opening a document or URL in the Windows AppVM from another VM:
.. code:: bash
[user@dom0 ~] $ qvm-open-in-vm my-win-appvm roadmap.pptx
[user@dom0 ~]$ qvm-open-in-vm my-win-appvm https://invisiblethingslab.com
… just like in the case of Linux AppVMs. Of course all those operations are governed by central policy engine running in Dom0 if the policy doesnt contain explicit rules for the source and/or target AppVM, the user will be asked whether to allow or deny the operation.
Inter-VM file copy and clipboard works for Windows AppVMs the same way as for Linux AppVM (except that we dont provide a command line wrapper, ``qvm-copy-to-vm`` in Windows VMs) to copy files from Windows AppVMs just right-click on the file in Explorer, and choose: Send To-> Other AppVM.
To simulate Ctrl-Alt-Delete in the HVM (SAS, Secure Attention Sequence), press Ctrl-Alt-Home while having any window of this VM in the foreground.
|windows-seamless-7.png|
**Changing between seamless and full desktop mode**
You can switch between seamless and “full desktop” mode for Windows HVMs in their settings in Qubes Manager. The latter is the default.
Using template-based Windows AppVMs
-----------------------------------
Qubes allows HVM VMs to share a common root filesystem from a select Template VM, just as for Linux AppVMs. This mode is not limited to Windows AppVMs, and can be used for any HVM (e.g. FreeBSD running in a HVM).
In order to create an HVM TemplateVM, the type “TemplateVM” has to be selected on creating the VM. Then set memory as appropriate, and install the Windows OS (or any other OS) into this template the same way as you would install it into a normal HVM please see instructions on :doc:`this page </user/advanced-topics/standalones-and-hvms>`.
If you use this Template as it is, then any HVMs that use it will effectively be DisposableVMs - the User directory will be wiped when the HVM is closed down.
If you want to retain the User directory between reboots, then it would make sense to store the ``C:\Users`` directory on the 2nd disk which is automatically exposed by Qubes to all HVMs. This 2nd disk is backed by the ``private.img`` file in the AppVMs and is not reset upon AppVMs reboot, so the users directories and profiles would survive the AppVMs reboot, unlike the “root” filesystem which will be reverted to the “golden image” from the Template VM automatically. To facilitate such separation of user profiles, Qubes Windows Tools provide an option to automatically move ``C:\Users`` directory to the 2nd disk backed by ``private.img``. Its a selectable feature of the installer. For Windows 7, the private disk must be renamed to ``Q:`` before QWT installation (see above); for Windows 10 and 11, this renaming occurs automatically during QWT installation.
If that feature is selected during installation, completion of the process requires two reboots:
- The private disk is initialized and formatted on the first reboot after tools installation. It cant be done **during** the installation because Xen mass storage drivers are not yet active.
- User profiles are moved to the private disk on the next reboot after the private disk is initialized. Reboot is required because the “mover utility” runs very early in the boot process so OS cant yet lock any files in there. This can take some time depending on the profiles size and because the GUI agent is not yet active dom0/Qubes Manager may complain that the AppVM failed to boot. Thats a false alarm (you can increase the AppVMs default boot timeout using ``qvm-prefs``), the VM should appear “green” in Qubes Manager shortly after.
It also makes sense to disable Automatic Updates for all the template-based AppVMs of course this should be done in the Template VM, not in individual AppVMs, because the system-wide settings are stored in the root filesystem (which holds the system-wide registry hives). Then, periodically check for updates in the Template VM and the changes will be carried over to any child AppVMs.
Once the template has been created and installed, it is easy to create AppVMs based on it, by selecting the type “AppVM” and a suitable template.
Using Windows disposables
-------------------------
Windows qubes can be used as disposables, like any other Linux-based qubes. On creating a template for Windows disposables, certain preparations have to be executed:
- Create an AppVM based on a Windows TemplateVM.
- Start this AppVM and insert a link to the command prompt executable in the ``Autostart`` directory of the Windows menu tree:
- **For Windows 7:**
- If the Windows qube started in seamless mode, hit the Windows keyboard key while the cursor is positioned in a window of this VM. In non-seamless mode, click on the Start button. In both cases, the Windows menu will be displayed.
- Position into the ``Autostart`` submenu.
- **For Windows 10 or 11:**
- Type Win+R to open the execution Prompt.
- Type ``shell:startup``.
- An explorer window will open, which is positioned to the ``Autostart`` folder.
- Right-click and select the option “New -> Link”.
- Select ``C:\Windows\System32\CMD.exe`` as executable.
- Name the link, e.g. as ``Command Prompt``.
- Close the Window with ``OK``.
- Shut down this AppVM.
- In the Qube Manager, refresh the applications of the newly created AppVM and select those applications that you want to make available from the disposable. Alternatively, in dom0 execute the command ``qvm-sync-appmenus <VMname>``, where ``<VMname>`` is the name of your windows qube.
- In the Qube Manager, go to the “Advanced” tab and enable the option ``Disposable template`` for your Windows qube. Alternatively, in dom0 execute the commands ``qvm-prefs <VMname> template_for_dispvms True`` and ``qvm-features <VMname> appmenus-dispvm 1``.
- Click ``Apply``.
- Still in the Advanced tab, select your Windows qube as its own ``Default disposable template``. Alternatively, in dom0 execute the command ``qvm-prefs <VMname> default_dispvm <VMname>``.
- Close the Qube Manager by clicking ``OK``.
Now you should have a menu ``Disposable: <VMname>`` containing the applications that can be started in a disposable Windows VM. If you set the newly created and configured Windows VM as ``Default disposable template`` for any other Windows- (or Linux-) based qube, this qube can use the Windows-based dispvm like any other disposable.
For further information on usage of disposables, see :doc:`How to use disposables </user/how-to-guides/how-to-use-disposables>`.
**Caution:** *If a Windows-based disposable is used from another qube via the* ``Open/Edit in DisposableVM`` *command, this disposable may not close automatically, due to the command prompt window still running in this dispvm. In this case, the disposable has to be shut down manually.*
Installation logs
-----------------
If the install process fails or something goes wrong during it, include the installation logs in your bug report. They are created in the ``%TEMP%`` directory, by default ``<user profile>\AppData\Local\Temp``. There are two text files, one small and one big, with names starting with ``Qubes_Windows_Tools``.
Uninstalling QWT is supported. After uninstalling you need to manually enable the DHCP Client Windows service, or set IP settings yourself to restore network access.
Configuration
-------------
Various aspects of Qubes Windows Tools (QWT) can be configured through the registry. The main configuration key is located in ``HKEY_LOCAL_MACHINE\SOFTWARE\Invisible Things Lab\Qubes Tools``. Configuration values set on this level are global to all QWT components. Its possible to override global values with component-specific keys, this is useful mainly for setting log verbosity for troubleshooting. Possible configuration values are:
.. list-table::
:widths: 14 14 14 14
:align: center
:header-rows: 1
* - Name
- Type
- Description
- Default value
* - LogDir
- String
- Directory where logs are created
- c:\\Program Files\\Invisible Things Lab\\Qubes Tools\\log
* - LogLevel
- DWORD
- Log verbosity (see below)
- 2 (INFO)
* - LogRetention
- DWORD
- Maximum age of log files (in seconds), older logs are automatically deleted
- 604800 (7 days)
Possible log levels:
.. list-table::
:widths: 11 11 11
:align: center
:header-rows: 1
* - Level
- Title
- Description
* - 1
- Error
- Serious errors that most likely cause irrecoverable failures
* - 2
- Warning
- Unexpected but non-fatal events
* - 3
- Info
- Useful information (default)
* - 4
- Debug
- Internal state dumps for troubleshooting
* - 5
- Verbose
- Trace most function calls
Debug and Verbose levels can generate large volume of logs and are intended for development/troubleshooting only.
To override global settings for a specific component, create a new key under the root key mentioned above and name it as the executable name, without ``.exe`` extension.
Component-specific settings currently available:
.. list-table::
:widths: 11 11 11 11 11
:align: center
:header-rows: 1
* - Component
- Setting
- Type
- Description
- Default value
* - qga
- DisableCursor
- DWORD
- Disable cursor in the VM. Useful for integration with Qubes desktop so you dont see two cursors. Can be disabled if you plan to use the VM through a remote desktop connection of some sort. Needs gui agent restart to apply change (locking OS/logoff should be enough since qga is restarted on desktop change).
- 1
Troubleshooting
---------------
If the VM is inaccessible (doesnt respond to qrexec commands, gui is not functioning), try to boot it in safe mode:
- ``[user@dom0 ~] $ qvm-start --debug <VMname>``
- Enable boot options and select Safe Mode (method depends on the Windows version; optionally with networking)
Safe Mode should at least give you access to logs (see above).
**Please include appropriate logs when reporting bugs/problems.** Logs contain the QWT version. If the OS crashes (BSOD) please include the BSOD code and parameters in your bug report. The BSOD screen should be visible if you run the VM in debug mode (``qvm-start --debug vmname``). If its not visible or the VM reboots automatically, try to start Windows in safe mode (see above) and 1) disable automatic restart on BSOD (Control Panel - System - Advanced system settings - Advanced - Startup and recovery), 2) check the system event log for BSOD events. If you can, send the ``memory.dmp`` dump file from ``C:\Windows``.
Xen logs in dom0 (``/var/log/xen/console/guest-*``) are also useful as they contain pvdrivers diagnostic output.
If a specific component is malfunctioning, you can increase its log verbosity as explained above to get more troubleshooting information. Below is a list of components:
.. list-table::
:widths: 32 32
:align: center
:header-rows: 1
* - Component
- Description
* - qrexec-agent
- Responsible for most communication with Qubes (dom0 and other domains), secure clipboard, file copying, qrexec services.
* - qrexec-wrapper
- Helper executable thats responsible for launching qrexec services, handling their I/O and vchan communication.
* - qrexec-client-vm
- Used for communications by the qrexec protocol.
* - qga
- Gui agent.
* - QgaWatchdog
- Service that monitors session/desktop changes (logon/logoff/locking/UAC…) and simulates SAS sequence (Ctrl-Alt-Del).
* - qubesdb-daemon
- Service for accessing Qubes configuration database.
* - network-setup
- Service that sets up network parameters according to VMs configuration.
* - prepare-volume
- Utility that initializes and formats the disk backed by private.img file. Its registered to run on next system boot during QWT setup, if that feature is selected (it cant run during the setup because Xen block device drivers are not yet active). It in turn registers move-profiles (see below) to run at early boot.
* - relocate-dir
- Utility that moves user profiles directory to the private disk. Its registered as an early boot native executable (similar to chkdsk) so it can run before any profile files are opened by some other process. Its log is in a fixed location: C:\\move-profiles.log (it cant use our common logger library so none of the log settings apply).
If there are network-related issues, the qube doesnt resolve DNS and has trouble accessing the Internet, this might be an issue with the PV Network Drivers.
In this case its recommended that the PV Network Drivers be unchecked during installation of Qubes Windows Tools as seen in the screenshot below.
|QWT_no_PV_network|
Updates
-------
When we publish a new QWT version, its usually pushed to the ``current-testing`` or ``unstable`` repository first. To use versions from current-testing, run this in dom0:
.. code:: bash
[user@dom0 ~] $ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing qubes-windows-tools
That command will download a new QWT ``iso`` file from the testing repository. It goes without saying that you should **backup your VMs** before installing anything from testing repos.
Uninstalling Qubes Windows Tools (QWT) in a Windows VM
------------------------------------------------------
Windows 7
=========
- Uninstall QWT 4.1.69-1, using the standard procedure from the system control panel of Windows. This will most likely result in a crash with the error INACCESSIBLE BOOT DEVICE, especially if the PV drivers were installed with QWT.
- Restart Windows again, hitting the F8 key, select the restart menu, and there select a start in safe mode.
- The system will start gain, but in a rather useless way. Just shut it down, and reboot again.
- Now Windows will start normally. Check in the control panel, if there are any Xen drivers left. If so, uninstall them.
- In the Windows device manager, check if there is still a (probably non working) Xen PV disk device. If so, uninstall it.
- In the control panel, check again, if the Xen drivers are removed. A Xen Bus Package (version 8.2.1.8) may remain and cannot be removed, but does no harm. Any other Xen drivers should have disappeared.
Windows 10 and 11
=================
If there is a drive ``D:`` from this earlier installation of Qubes Windows Tools, it will probably contain incomplete private data; especially the folder ``AppData`` containing program configuration data will be missing. In this situation, it may be better to perform a new Windows installation, because repair may be difficult and trouble-prone.
- First, be sure that the automatic repair function is disabled. In a command window, execute ``bcdedit /set recoveryenabled NO``, and check that this worked by issuing the command ``bcdedit``, without parameters, again.
- Now, uninstall QWT (currently version 4.2.0-1), using the Apps and Features function of Windows. This will most likely result in a crash with the error INACCESSIBLE BOOT DEVICE, especially if the PV drivers were installed with QWT.
- Restart Windows again, possibly two or three times, until repair options are offered. By hitting the F8 key, select the restart menu, and there select a start in safe mode (in German, its option number 4).
- The system will start again, but in a rather useless way. Just shut it down, and reboot again.
- Now Windows will start normally. Check in the Apps and Features display, if there are any Xen drivers left. If so, uninstall them.
- In the Windows device manager, check if there is still a (probably non working) Xen PV disk device. If so, uninstall it.
- In the Apps and Features display, check again if the Xen drivers are removed. A Xen Bus Package may remain and cannot be removed, but does no harm. Any other Xen drivers should have disappeared.
After successful uninstallation of the PV disk drivers, the disks will appear as QEMU ATA disks.
**Warning:** The uninstallation of the PV disk drivers may lead Windows to declare that the hardware has changed and that, in consequence, the activation is no longer valid, possibly complaining that the use of the software is no longer lawful. It should be possible to reactivate the software if a valid product key is provided.
.. |QWT_install_select| image:: /attachment/doc/QWT_install_select.png
.. |QWT_install_driver| image:: /attachment/doc/QWT_install_driver.png
.. |QWT_install_no_restart| image:: /attachment/doc/QWT_install_no_restart.png
.. |windows-seamless-4.png| image:: /attachment/doc/windows-seamless-4.png
.. |windows-seamless-1.png| image:: /attachment/doc/windows-seamless-1.png
.. |windows-seamless-7.png| image:: /attachment/doc/windows-seamless-7.png
.. |QWT_no_PV_network| image:: /attachment/doc/QWT_no_PV_network.png

View file

@ -0,0 +1,423 @@
========================================
How to install Windows qubes in Qubes OS
========================================
You can install Windows just like any other OS as an :doc:`HVM </user/advanced-topics/standalones-and-hvms>`, if you just want something simple and you can live without some features. This works for Windows XP, 7, 8, 8.1, 10, and 11.
Please keep in mind that Qubes Windows Tools are not supported on Windows XP. Windows 8 1 may work comparable to Windows 10, but this has not been tested, as this system in no longer supported and probably has no significance anymore.
You will get an environment in which basic functions are supported, but integration into the Qubes environment is rather restricted. The following functions will work right out of the box:
- display (1440x900 or 1280x1024 is a nice fit onto FHD hw display)
- keyboard (incl. correct mapping), pointing device
- network (emulated Realtek NIC)
- audio output and input (available even without QWT installation if ``qvm-features audio-model`` is set as ``ich6``)
For better integration, a set of drivers and services, called Qubes Windows Tools (QWT) is available. Installation of these tools is straightforward and is described in a :doc:`separate document </user/templates/windows/qubes-windows-tools-4-1>`. QWTs main features are:
- Copy/paste between qubes
- Copy files between qubes
- Attaching USB devices to the qube
- Attaching block devices to the qube (XEN PV disk driver must be installed)
- Automatically set up networking
- Automatically set up time/clock synchronization
- XEN PV drivers (some of them optional)
- Optional user migration from ``C:`` to the qubes private volume (to be able use the qubes as a TemplateVM).
- Seamless mode (Windows 7 and 11 only for now)
- Propagating keyboard layout?
Importing a Windows VM from an earlier version of Qubes
-------------------------------------------------------
- Importing from R3.2 or earlier will not work, because Qubes R3.2 has the old stubdomain by default, and this is preserved over backup and restore (as Windows otherwise won't boot).
- Direct import from R4.0 may work if no Qubes Windows Tools are installed, but has not been tested.
- Importing from R4.1 should work, see :doc:`Migrate backups of Windows VMs created under previous Qubes versions </user/templates/windows/qubes-windows-migrate>`.
Windows VM installation
-----------------------
**qvm-create-windows-qube**: An unofficial, third-party tool for automating this process is available `here <https://github.com/elliotkillick/qvm-create-windows-qube>`__. (Please note that this tool has not been reviewed by the Qubes OS Project. Use it at your own risk.)
However, if you are an expert or want to do it manually, you may continue below.
**Notes:**
- The instructions may work on other versions than Windows 7, 10, and 11 x64 but havent been tested.
- Qubes Windows Tools (QWT) only supports Windows 7, 10, and 11 x64. For installation, see :doc:`Qubes Windows Tools </user/templates/windows/qubes-windows-tools>`.
Provide installation media
==========================
Have the Windows ISO image (the 64-bit version) downloaded in some qube.
Windows ISOs can be downloaded directly from Microsoft (e.g., `here <https://www.microsoft.com/en-us/software-download/windows10ISO>`__ for Win10), or selected and downloaded via the `Windows Media Creation Tool <https://go.microsoft.com/fwlink/?LinkId=691209>`__. You should, however, regard the downloaded image to be untrustworthy, since there is no reliable way to check that the download was not somehow compromised (see the discussion in issue `Simplify Qubes Windows Tools Installation for R4.1 #7240 <https://github.com/QubesOS/qubes-issues/issues/7240>`__).
Unofficial “debloated” ISOs from projects like reviOS 18 or ameliorated 10 can be found on the net, although obviously you should consider them even “unsafer” than MS provided ISOs. Alternatively, one could download an official ISO and run scripts/apply patches before installation. Some of the “tweaks” might end up being too much depending on the qubes planned usage, though (eg. no appx functionality in ameliorated Windows - so the installation of Windows Store apps is impossible, even with PowerShell).
Create Windows VM
=================
Create a VM named WindowsNew in :doc:`HVM </user/advanced-topics/standalones-and-hvms>` mode (Xens current PVH limitations prevent using PVH). This can be done in either of two ways:
- Using Qube Manager: In order to create the new qube, select the command Qube -> New Qube in the Qube Manager:
- Name: ``WindowsNew``, Color: ``orange`` (for a standalone qube, ``black`` for a template)
- Type: ``StandaloneVM (fully persistent)`` or ``TemplateVM (template home, persistent root)``
- Template: ``(none)``
- Networking: ``sys-firewall (default)``
- Launch settings after creation: check
- Click “OK”.
- Settings:
- Basic:
- System storage: 60.0+ GB
- Advanced:
- Include in memory balancing: uncheck
- Initial memory: 4096+ MB
- Kernel: ``(none)``
- Mode: ``HVM``
- Click “Apply”.
After creation, set ``qvm-prefs WindowsNew qrexec_timeout 7200`` via CLI in a dom0 terminal.
- Using CLI in a dom0 terminal
- This can also be done via the following CLI commands in dom0, for a standalone qube:
.. code:: bash
qvm-create --class StandaloneVM --label orange --property virt_mode=hvm WindowsNew
and for a template:
.. code:: bash
qvm-create --class TemplateVM --label black --property virt_mode=hvm WindowsNew
- After creation, set the following parameters via CLI in a dom0 terminal:
.. code:: bash
qvm-volume extend WindowsNew:root 60g
qvm-prefs WindowsNew memory 4096
qvm-prefs WindowsNew maxmem 4096
qvm-prefs WindowsNew kernel ''
qvm-prefs WindowsNew qrexec_timeout 7200
These parameters are set for the following reasons:
- A typical Windows installation requires between 40 GB to 60 GB of disk space, depending on the version (Home/Professional/…). Windows updates also end up using significant space. So, extend the root volume from the default 10 GB to at least 60 GB (note: it is straightforward to increase the root volume size after Windows is installed: simply extend the volume again in dom0 and then extend the system partition with Windowss disk manager).
- Setting memory to 4096 MB may work in most cases, but using 6144 MB (or even 819 2MB) may reduce the likelihood of crashes during installation, especially for Windows 10 or 11. This is important as Windows qubes have to be created without memory balancing, as requested by the parameter settings described above.
- The Windows installer requires a significant amount of memory or else the VM will crash with such errors:
.. code:: bash
/var/log/xen/console/hypervisor.log:
p2m_pod_demand_populate: Dom120 out of PoD memory! (tot=102411 ents=921600 dom120)
(XEN) domain_crash called from p2m-pod.c:1218
(XEN) Domain 120 (vcpu#0) crashed on cpu#3:
So, increase the VMs memory to 4096 MB (memory = maxmem because we dont use memory balancing), or 6144 MB / 8192 MB, as recommended above.
- Disable direct boot so that the VM will go through the standard CD-ROM/HDD boot sequence. This is done by setting the qubes kernel to an empty value.
- After creating the new qube, increase the VMs ``qrexec_timeout``: in case you happen to get a BSOD or a similar crash in the VM, utilities like ``chkdsk`` wont complete on restart before ``qrexec_timeout`` automatically halts the VM. That can really put the VM in a totally unrecoverable state, whereas with higher ``qrexec_timeout``, ``chkdsk`` or the appropriate utility has plenty of time to fix the VM. Note that Qubes Windows Tools also require a larger timeout to move the user profiles to the private volume the first time the VM reboots after the tools installation. So set the parameter via the following CLI command from a dom0 terminal, because the Qube manager does not support this setting:
.. code:: bash
qvm-prefs WindowsNew qrexec_timeout 7200
Start Windows VM
================
- The VM is now ready to be started; the best practice is to use an installation ISO :ref:`located in a VM <user/advanced-topics/standalones-and-hvms:installing an os in an hvm>`. Now boot the newly created qube from the Windows installation media. In the Qubes Manager:
- Select the new qube, in this example “WindowsNew”.
- Switch to the “Advanced” tab.
- Click “Boot from CDROM”:
- “from file in qube”:
- Select the qube that has the ISO.
- Select ISO by clicking “…”.
- Click “OK” to boot into the Windows installer.
This can also be done via the following CLI command in dom0 (assuming that the Windows installer ISO is stored in the directory ``/home/user/`` in the AppVM ``untrusted``):
.. code:: bash
qvm-start --cdrom=untrusted:/home/user/windows_install.iso WindowsNew
- Install Windows on the new VM
- At the first start, the Windows logo may be briefly shown, and then a black screen with a blinking cursor may appear and stay for a few minutes. This is normal, and you just have to wait until the installation window appears.
- The installation will run mostly as usual, but automatic reboots will halt the qube - just restart it again and again until the installation is finished. Note, however, that for these restarts, the parameter ``--cdrom`` **must not** be used, because otherwise the installation will start all over.
- Install on the first disk.
- **For Windows 11 only**: Windows 11 requires TPM 2.0, which currently is not supported by Xen. In Order to install Windows 11 under Qubes, the check for TPM in the Windows installer has to be disabled:
- When the window allowing you to select a Windows version is displayed, **do not select a version and close this window**, but instead type Shift-F10 to open a console window.
- Here you type ``regedit`` to start the registry editor.
- There you position to the key ``HKEY_LOCAL_MACHINE\SYSTEM\Setup``.
- Now create the key ``LabConfig``.
- Position to this key and create 3 DWORD values called ``BypassTPMCheck``, ``BypassSecureBootCheck`` and ``BypassRAMCheck`` and set each value to ``1``.
- Close the registry editor and console windows.
- You will then return to the setup, which will continue normally and install Windows 11 without TPM 2.0.
**Caution:** This temporary patch may cease to work if it so pleases Microsoft sometime. With version 24H2 it is still working.
- The installation of **Windows 11** may require an internet connection to grab a Microsoft ID. Previously, this was true only for the home edition, but since version 24H2, it extends to the Pro edition, too. A workaround to bypass the internet connection requirements of the Windows 11 setup has been published that works for version 21H2 but may be blocked for newer versions:
- When you reach the “Lets Connect You To A Network” page, type Shift-F10 to open a console window.
- Here you type ``taskmgr`` to start the Task Manager window so you can see all running processes.
- Expand the Task Manager by clicking the “More Details” button, and then find “Network Connection Flow.”
- Select this process and then hit the “End Task” button.
- Now you can close these newly opened windows and return to the Windows 11 setup, where you will enter local account information.
- For Windows 11 version 22H2, the following sequence of actions to use a local account instead of a Microsoft account has been published:
- Enter ``no@thankyou.com`` (or some other senseless address) as the email address and click ``Next`` when Windows 11 setup prompts you to log into your Microsoft account.
- Enter any text you want in the password field and click ``Sign in``. If this method works, youll get a message saying “Oops, something went wrong.”
- Click ``Next``. A screen appears saying “Whos going to use this device?” This is the local account creation screen.
- Enter the username you want to use and click ``Next``.
- Enter a password and click ``Next``. You can leave the field blank, but its not recommended.
- For version 24H2, the following actions allow you to install Windows 11 with a local account, if the VM is defined, at least temporarily, without a netVM:
- After some reboots, the VM will show a window allowing the selection of an installation country. In this window, type Shift-F10 to open a console window.
- In this window, type ``oobe\bypassnro``. The VM will then reboot and return to the country selection window. The network connection window will now show an option “I dont have internet”, allowing you to define a local account.
- In new preview builds of Windows (26120 and beyond, and eventually the next release version), the ``oobe\bypassnro`` command has been erased and no longer works. Instead, theres a new command called start ``ms-chx:localonly`` that does something similar. In this case, proceed as follows:
- Follow the Windows 11 install process until you get to the Sign in screen. Here, type Shift-F10 to open a console window.
- Enter start ``ms-cxh:localonly`` at the command prompt.
- A “Create a user for this PC” dialog window appears, allowing you to define a local account.
- On systems shipped with a Windows license, the product key may be read from flash via root in dom0:
``strings < /sys/firmware/acpi/tables/MSDM``
Alternatively, you can also try a Windows 7 license key (as of 2018/11 they are still accepted for a free upgrade to Windows 10).
- The VM will shut down after the installer completes the extraction of Windows installation files. Its a good idea to clone the VM now (eg. ``qvm-clone WindowsNew WindowsNewbkp1``). Then, (re)start the VM via the Qubes Manager or with ``qvm-start WindowsNew`` from a dom0 terminal (without the ``--cdrom`` parameter!).
The second part of Windows installer should then be able to complete successfully.
After Windows installation
==========================
- From the Windows command line, disable hibernation in order to avoid an incomplete Windows shutdown, which could lead to corruption of the VMs disk.
.. code:: bash
powercfg -H off
Also, recent versions of Windows wont show the CD-ROM drive after starting the qube with ``qvm-start vm --cdrom ...`` (or using the GUI). The solution is to disable hibernation in Windows with this command. (That command is included in QWTs setup, but its necessary to run it manually in order to be able to open QWTs setup ISO/CD-ROM in Windows).
- In case you switch from ``sys-firewall`` to ``sys-whonix``, youll need a static IP network configuration; DHCP wont work for ``sys-whonix``. Sometimes this may also happen if you keep using ``sys-firewall``. In both cases, proceed as follows:
- Check the IP address allocated to the qube - either from GUI Manager, or via ``qvm-ls -n WindowsNew`` from a dom0 terminal (E.g. 10.137.0.x with gateway 10.138.y.z).
- In the Windows qube, open the Network Manager and change the IPv4 configuration of the network interface from “Automatic” to “Manual”.
- Enter the Address: 10.137.0.x in our example.
- Enter the Netmask: 255.255.255.0
- Enter the Gateway: 10.138.y.z in our example.
- Enter DNS: 10.139.1.1,10.139.1.2 (the Virtual DNS addresses used by Qubes.
- Click “Apply”. You should now see “Connected”.
- Given the higher-than-usual memory requirements of Windows, you may get a ``Not enough memory to start domain 'WindowsNew'`` error. In that case, try to shut down unneeded VMs to free memory before starting the Windows VM.
At this point, you may open a tab in dom0 for debugging, in case something goes amiss:
.. code:: bash
tailf /var/log/qubes/vm-WindowsNew.log \
/var/log/xen/console/hypervisor.log \
/var/log/xen/console/guest-WindowsNew-dm.log
At that point you should have a functional and stable Windows VM, although without updates, Xens PV drivers nor Qubes integration (see sections :ref:`Windows Update <user/templates/windows/windows-qubes-4-1:windows update>` and :ref:`Xen PV drivers and Qubes Windows Tools <user/templates/windows/qubes-windows-tools-4-1:xen pv drivers and qubes windows tools>`). It is a good time to clone the VM again.
Installing Qubes Windows Tools
==============================
To install Qubes Windows Tools, follow instructions in :doc:`Qubes Windows Tools </user/templates/windows/qubes-windows-tools>`, but dont forget to ``qvm-clone`` your qube before you install Qubes Windows Tools (QWT) in case something goes south.
Post-install best practices
===========================
Optimize resources for use in virtual machines as “vanilla” versions of Windows are bloated; e.g.:
- Set up Windows for best performance (this pc? advanced settings? …)
- Think about Windows page file: is it needed? Should you set it with a fixed size? Maybe on the private volume?
- Disable services you dont need
- Disable networking stuff in the network adapters settings (e.g., link discovery, file and print server, …)
- Background: set a solid color
- …
For additional information on configuring a Windows qube, see the `Customizing Windows 7 templates <https://forum.qubes-os.org/t/19005>`__ page (despite the focus on preparing the VM for use as a template, most of the instructions are independent from how the VM will be used - i.e. TemplateVM or StandaloneVM).
Windows as a template
---------------------
As described above, Windows 7, 10, and 11 can be installed as TemplateVM. To have the user data stored in AppVMs depending on this template, the user data has to be stored on a private disk named ``Q:``. If there is already a disk for user data, possibly called ``D:``, it has to be renamed to ``Q:``. Otherwise, this disk has to be created via the Windows ``diskpart`` utility, or the Disk Management administrative function by formatting the qubes private volume and associating the letter ``Q:`` with it. The volume name is of no importance.
Moving the user data is not directly possible under Windows, because the directory ``C:\Users`` is permanently open and thus locked. Qubes Windows Tools provides a function to move this data on Windows reboot when the directory is not yet locked. To use this function, a working version of QWT has to be used (see the documentation on QWT installation). In this case, the option ``Move User Profiles`` has to be selected on QWT installation. Then, the user files are moved to the new disk during the reboot at the end of the installation. After the user data has been moved to `Q:`, be sure not to use the option `Move User Profiles` on subsequent installations of Qubes Windows Tools.
**Windows 7 only:** This can also be accomplished without QWT installation, avoiding the installation of the Xen PV drivers, if the risk of a compromised version of these drivers, according to QSB-091, is considered too severe. In this case, the file ``relocate_dir.exe`` has to be extracted from the QWT installer kit ``qubes-tools-x64.msi``, which will be shown as the content of the CD-ROM made available by starting the Windows qube with the additional option ``--install-windows-tools`` (see the QWT installation documentation). The installer kit is a specially formatted archive, from which the file ``relocate_dir.exe`` can be extracted using a utility like 7-Zip. The file has to be copied to ``%windir%\system32``, i.e., usually ``C:\Windows\system32``. Furthermore, locate the registry key ``HKLM\SYSTEM\CurrentControlSet\Control\Session Manager``, and add the text ``relocate_dir.exe C:\Users Q:\Users`` as a new line to the ``REG_MULTI_SZ`` value ``\BootExecute`` in this key. On rebooting the Windows qube, the user files will be moved to the disk ``Q:``, and the additional registry entry will be removed, such that this action occurs only once.
AppVMs based on these templates can be created in the normal way by using the Qube Manager or by specifying
.. code:: bash
qvm-create --class=AppVM --template=<VMname>
On starting the AppVM, sometimes a message is displayed that the Xen PV Network Class needs to restart the system. This message can be safely ignored and closed by selecting “No”.
**Caution:** These AppVMs must not be started while the corresponding TemplateVM is running, because they share the TemplateVMs license data. Even if this could work sometimes, it would be a violation of the license terms.
Furthermore, if manual IP setup was used for the template, the IP address selected for the template will also be used for the AppVM, as it inherits this address from the template. Qubes, however, will have assigned a different address to the AppVM, which will have to be changed to that of the template (e.g., 10.137.0.x) so that the AppVM can access the network, via the CLI command in a dom0 terminal:
.. code:: bash
qvm-prefs WindowsNew ip 10.137.0.x
Windows 10 and 11 Usage According to GDPR
-----------------------------------------
If Windows 10 or 11 is used in the EU to process personal data, according to GDPR no automatic data transfer to countries outside the EU is allowed without explicit consent of the person(s) concerned, or other legal consent, as applicable. Since no reliable way has been found to completely control the sending of telemetry from Windows 10 or 11, the system containing personal data must be completely shielded from the internet.
This can be achieved by installing Windows 10 or 11 in a TemplateVM with the user data directory moved to a separate drive (usually ``Q:``). Personal data must not be stored within the TemplateVM, but only in AppVMs depending on this TemplateVM. Network access by these AppVMs must be restricted to the local network and perhaps additional selected servers within the EU. Any data exchange of the AppVMs must be restricted to file and clipboard operations to and from other VMs in the same Qubes system. It may be necessary to connect the Template VM to the internet from time to time in order to keep the system and its licenses updated, but this is not problematic in such a configuration, as any user data is stored in AppVMs and not in the Template VM itself.
Windows update
--------------
Depending on how old your installation media is, fully updating your Windows VM may take *hours* (this isnt specific to Xen/Qubes) so make sure you clone your VM between the mandatory reboots in case something goes wrong. For Windows 7, you may find the necessary updates bundled at `WinFuture Windows 7 SP1 Update Pack 2.107 (Vollversion) <https://10gbit.winfuture.de/9Y6Lemoxl-I1_901xOu6Hg/1648348889/2671/Update%20Packs/2020_01/WinFuture_7SP1_x64_UpdatePack_2.107_Januar_2020-Vollversion.exe>`__. At your own risk you may use such an installation image with bundled updates, but generally we do not recommend this way for security reasons - so, if you do it anyhow, check that you get this image from a source that you trust, which may be quite different from that one named here!
**Note:** if you already have Qubes Windows Tools installed the video adapter in Windows will be “Qubes video driver”, and you wont be able to see the Windows Update process when the VM is being powered off because Qubes services would have been stopped by then. Depending on the size of the Windows update packs it may take a bit of time until the VM shutdowns by itself, leaving one wondering if the VM has crashed or still finalizing the updates (in dom0 a changing CPU usage - eg. shown with the domains widget in the task bar, or with ``xentop`` - usually indicates that the VM hasnt crashed).
To avoid guessing the VMs state, enable debugging (``qvm-prefs -s WindowsNew debug true``) and in Windows device manager (My computer -> Manage / Device manager / Display adapters) temporarily re-enable the standard VGA adapter and disable “Qubes video driver”. You can disable debugging and revert to Qubes display once the VM is updated.
Troubleshooting
---------------
**Windows 7 - USB drives are not visible in your domain**
After Qubes Windows Tools have been installed on your Windows 7 system, please install the `Chipset_Driver_X2NF0_WN_2.1.39.0_A03.EXE driver <https://web.archive.org/web/20221007093126/https://dl.dell.com/FOLDER01557883M/3/Chipset_Driver_X2NF0_WN_2.1.39.0_A03.EXE>`__. Then shut down your domain.
From now on you should be able to attach your USB drive by passing it from your *Qubes Devices* menu as a *USB device* rather than *Data (Block) Device*
This procedure has been tested on Windows 7 installed as a TemplateVM. Different combinations (such as StandaloneVM or different Windows versions) have not been tested.

View file

@ -9,12 +9,10 @@ Qubes Windows Tools (QWT) are then usually installed to provide integration with
For more information about Windows VMs in Qubes OS, please see the following external resources: For more information about Windows VMs in Qubes OS, please see the following external resources:
- :doc:`Installing and Using Windows-based VMs </user/templates/windows/windows-qubes-4-1>` - :doc:`Installing and Using Windows-based VMs </user/templates/windows/windows-qubes>`
- :doc:`Installing and Using Qubes Windows Tools </user/templates/windows/qubes-windows-tools-4-1>` - :doc:`Installing and Using Qubes Windows Tools </user/templates/windows/qubes-windows-tools>`
- `Create a Gaming HVM in Qubes <https://forum.qubes-os.org/t/create-a-gaming-hvm/19000>`__ - `Create a Gaming HVM in Qubes <https://forum.qubes-os.org/t/create-a-gaming-hvm/19000>`__
- :doc:`Migrate backups of Windows VMs created under Qubes R4.0 to R4.1 </user/templates/windows/migrate-to-4-1>` - :doc:`Migrate Windows qubes from old Qubes versions </user/templates/windows/qubes-windows-migrate>`