To force <code>dom0</code> updates over Tor, set Qubes' <code>dom0</code> UpdateVM to <code>{{project_name_gateway_vm}}</code>. <ref>
Or manually set the torified UpdateVM in <code>dom0</code> terminal.

{{CodeSelect|code=
qubes-prefs updatevm {{project_name_gateway_vm}}
}}
</ref>

* <code>Qube Manager</code> &rarr; <code><u>S</u>ystem</code> &rarr; <code><u>G</u>lobal Settings</code> &rarr; <code>Dom0 UpdateVM:</code> <code>{{project_name_gateway_vm}}</code> &rarr; <code>OK</code>

To revert this change, set Qubes' <code>dom0</code> UpdateVM to <code>sys-firewall</code> or another preferred VM. <ref>
To revert this change in <code>dom0</code> terminal, run.

{{CodeSelect|code=
qubes-prefs updatevm sys-firewall
}}
</ref>

* <code>Qubes Manager</code> &rarr; <code><u>S</u>ystem</code> &rarr; <code><u>G</u>lobal Settings</code> &rarr; <code>Dom0 UpdateVM:</code> <code>sys-firewall</code></code> &rarr; <code>OK</code>