On Tue, Apr 14, 2020 at 03:49:33PM -0700, Vít Šesták wrote: > b. When you have a StandaloneVM you don't run often, it might miss some > updates, so you are more likely to run some software with known > vulnerabilities after boot. This does not happen for Temlate-based-VM > provided that you use some other VMs from the same template.
That is true if you depend on the build-in mechanism to update your qubes. It's however very easy to write a simple shell script in dom0 that calls something like ... qvm-run -a qube "sudo apt update && sudo apt upgrade -y" ... for every template and standalone qube. You can even go a step further and have cron run it once a day. /Sven -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20200414232412.GA2174%40app-email-private.
signature.asc
Description: PGP signature
