The closest you can get to Qubes on Windows would be to follow Microsoft's Privileged Access Workstation (PAW) guide, but it requires a lot of additional infrastructure[3]. That infrastructure allows you to do remote attestation of the virtual machines, but makes it costly to deploy in a SMB or homelab environment.
I don't expect it'll be very long before PAW and WDAG are usable at the same time, with colored window borders indicating the origin virtual machine. I hope this is on Microsoft's roadmap.
Video on privileged access workstation use, starting at a demo: https://youtu.be/3v8yQz2GWZw?t=41m48s
Video on privileged access workstation setup: https://www.youtube.com/watch?v=aPhfRTLXk_k
[1] https://docs.microsoft.com/en-us/windows/threat-protection/w...
[2] https://clearlinux.org/features/intel®-clear-containers
[3] https://docs.microsoft.com/en-us/windows-server/identity/sec...
It's unmaintained now, but it is basically the same idea as WDAG. Essentially similar to firejail but the container gets its own lightweight kernel and runs in a stripped down VM, so the attack surface is KVM, not all parts of the kernel that aren't firewalled off by SECCOMP.
Did you know if you force remove Edge from Windows 10 it will forever after ignore the "always use this" checkbox and prompt you to choose your default browser every time the browser is called from a link in an application?
1) Support anything other than Edge/its own apps
2) Allow the feature to be accessed by users of all Windows editions
I understand for now it's still experimental and whatnot, but I'm not getting my hopes up.
lol. the whole point of an airgap is that you can very easily -at a glace- verify that the system is secure because there's no inputs/outputs to/from it (air gapped). trying to implement it using a hypervisor turns it into a buzzword.