NIDS: Should be pretty straighforward in QubeOS architecture, just create a 
proxyVM and install the NIDS software in its template. After you are done 
configuring it, boot it, check network connectivity and if everything is 
fine, configure the VM's to use the nidsVM as its nerwork VM.

HIDS: I really do not see its ue case. If you are in need of a HIDS, either 
you dont trust what it is installed on the template (should not install 
untrusted software in it) or the VM usage is not trusted (you should be 
using disposable VM's and Qubes has them)

The only use case I find for a HIDS is if you have a VM serving as a 
server, and want to really know there is nothing suspicious in its private 
files.

El martes, 23 de junio de 2020 a las 14:57:10 UTC+2, Jonas escribió:

> Why are No Network introduction system preinstalled.
>
> And why are No Firewall Messages to allow outgoing and ingoing Network 
> Firewall Message popuped Like in opensnitch
>
>
>
> Gesendet von ProtonMail mobile
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/da61162f-daf6-46a0-b0ef-b54238ea88e3n%40googlegroups.com.

Reply via email to