[To the Qubes team - have there been efforts to support enterprise clients?]
Frafra - When NxTop was released I did some beta work with them and was sad when Citrix acquired them, renamed the product XenClient XT, stopped considering non-enterprise use cases and then, finally, killed the product. [See slide #8: https://www.slideshare.net/xen_com_mgr/xen-project-15-years-down-the-line ] Anyway. The open source OpenXT (open source based on the above) is/was designed for the use case discussed in this thread and is the underlying platform of DoD's SecureView environment. The enterprise-level admin console can: - Control access to and disable/wipe clients - Push out Xen/dom0 updates - Push out VM and/or template updates - Delete and/or redeploy enterprise owned VMs - Delete and/or redeploy local user's personal VM (e.g. after malware incident) Local-machine limited admin console (dom0): - Refresh or redeploy user's personal VM. Not sure about VPN functionality external to the VMs themselves (e.g. does it support configurable proxying per VM?). If not, probably best to to segregate VMs by VM-hosted VPNs and the local LAN would always be considered hostile. In any case, might be worth looking into OpenXT for this. It's a quiet project, not sure how actively maintained, but there is some movement in github. Brendan -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/be2dba37-debe-44c0-b5bc-f49d26ad8df7%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.