Update disposablevm-customization.md

This commit is contained in:
goldiqubes 2019-01-21 12:15:28 +00:00 committed by GitHub
parent 7102d0817d
commit d048740d01
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -246,6 +246,15 @@ Using DisposableVMs in this manner is ideal for untrusted qubes which require pe
[user@dom0 ~]$ qvm-prefs disp-sys-usb autostart true
7. Users should now follow instructions on [How to hide USB controllers from dom0](/doc/usb/#how-to-hide-all-usb-controllers-from-dom0)
8. At this point your mouse may not work. In which case you should follow this qubes guide https://www.qubes-os.org/doc/usb/
Edit the qubes.InputMouse policy file in dom0, which is located here:
/etc/qubes-rpc/policy/qubes.InputMouse
Add a line like this to the top of the file:
disp-sys-usb dom0 allow,user=root
#### Starting the DisposableVMs ####