mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-26 15:59:24 -05:00
0c95b3ae4d
This reverts commit 24e6a8a616
.
https://github.com/QubesOS/qubes-issues/issues/6701#issuecomment-862060759
5.0 KiB
5.0 KiB
lang | layout | redirect_from | ref | title | |||||
---|---|---|---|---|---|---|---|---|---|
en | doc |
|
142 | System Requirements |
System Requirements
Notice:
The system requirements on this page are necessary, but not sufficient, for Qubes compatibility at a minimal or recommended level.
In other words, just because a computer satisfies these requirements doesn't mean that Qubes will successfully install and run on it.
We strongly recommend consulting the Hardware Compatibility List to verify that Qubes can install and run on your specific model in the ways you need it to.
Minimum
- CPU: 64-bit Intel or AMD processor (also known as
x86_64
,x64
, andAMD64
)- Intel VT-x with EPT or AMD-V with RVI
- Intel VT-d or AMD-Vi (also known as AMD IOMMU)
- Memory: 6 GB RAM
- Storage: 32 GB free space
Recommended
- CPU: 64-bit Intel or AMD processor (also known as
x86_64
,x64
, andAMD64
)- Intel VT-x with EPT or AMD-V with RVI
- Intel VT-d or AMD-Vi (also known as AMD IOMMU)
- Memory: 16 GB RAM
- Storage: 128 GB free space
- High-speed solid-state drive strongly recommended
- Graphics: Intel integrated graphics processor (IGP) strongly recommended
- Nvidia GPUs may require significant troubleshooting
- AMD GPUs have not been formally tested, but Radeons (especially RX580 and earlier) generally work well
- Peripherals: A non-USB keyboard or multiple USB controllers
- TPM: Trusted Platform Module (TPM) with proper BIOS support (required for Anti Evil Maid)
- Other: Satisfaction of all hardware certification requirements for Qubes 4.x
Choosing Hardware
- Please see the Hardware Compatibility List for a compilation of hardware reports generated and submitted by users across various Qubes versions. (For more information about the HCL itself, see here.)
- See the Certified Hardware page.
- See the Hardware Testing page.
Important Notes
- Installing Qubes in a virtual machine is not recommended, as it uses its own bare-metal hypervisor (Xen).
- Qubes can be installed on systems which do not meet the recommended requirements. Such systems will still offer significant security improvements over traditional operating systems, since things like GUI isolation and kernel protection do not require special hardware.
- Qubes can be installed on a USB flash drive or external disk, and testing has shown that this works very well. A fast USB 3.0 flash drive is recommended for this. (As a reminder, its capacity must be at least 32 GiB.) Simply plug the flash drive into the computer before booting into the Qubes installer from a separate installation medium, choose the flash drive as the target installation disk, and proceed with the installation normally. After Qubes has been installed on the flash drive, it can then be plugged into other computers in order to boot into Qubes. In addition to the convenience of having a portable copy of Qubes, this allows users to test for hardware compatibility on multiple machines (e.g., at a brick-and-mortar computer store) before deciding on which computer to purchase. (See hcl-report for advice on hardware compatibility testing.) Remember to change the devices assigned to your NetVM and USB VM if you move between different machines.
- Advice on finding a VT-d capable notebook.
- You can check whether an Intel processor has VT-x and VT-d on ark.intel.com.