How to install Qnap QTS OS on NVME M.2 SSD

How to install Qnap QTS OS on NVME M.2 SSD

If you want to install OS on the NVMe, you should remove HDDs and keep only NVMe SSDs in there. The during the setup (will need to reset your NAS to factory defaults) you will be able to create volumes and RAID on a pair of NVMe M.2 SSDs (or 2.5inch SSDs). The system will then be installed on this volume.
Afterwards, you can put inside HDDs and build a RAID for these mechanical drives. Now all OS files will live on SSD also default app installation location will be NVMe. Alternatively, you can create NVMe volume and kee HDD RAID as the main storage location. All apps can be migrated to NVMe storage.

I hope this helps.





If you like this service, please consider supporting us.
We use affiliate links on the blog allowing NAScompares information and advice service to be free of charge to you. Anything you purchase on the day you click on our links will generate a small commission which is used to run the website. Here is a link for Amazon and B&H. You can also get me a ☕ Ko-fi or old school Paypal. Thanks! To find out more about how to support this advice service check HERE   If you need to fix or configure a NAS, check Fiver   Have you thought about helping others with your knowledge? Find Instructions Here  


Or support us by using our affiliate links on Amazon UK and Amazon US

locked content ko-fi subscribe

DISCUSS with others your opinion about this subject.
ASK questions to NAS community
SHARE more details what you have found on this subject
CONTRIBUTE with your own article or review. Click HERE
IMPROVE this niche ecosystem, let us know what to change/fix on this site
EARN KO-FI Share your knowledge with others and get paid for it! Click HERE


36 thoughts on “How to install Qnap QTS OS on NVME M.2 SSD

  1. If after installing Qnap QTS OS on NVME M.2 SSD’s I need to upsize the NVME’s, what would be the procedure? Will there be any dilemma when it comes time to migrate the OS to the larger drives (without losing access to data on the other drives). It would be cheaper to start with small capacity NVME but I’m reluctant until I know if that’s a bad choice or not.

  2. The more secure you make things, the harder it will be to manage and jump through to get what your after. You could use 2FA, and encrypt volumes, for single person or two, all of that really is not required.. as long as you have good passwords for each user., and just gets in the way anyway.

    encrypted volumes also slow down you NAS as well, but depends on the CPU/RAM your NAS has. eg TS-451 would better than TS-251
    I would prefer user-based folder access for security than 2FA just because 2FA and volume encryption works as a “whole” where as user password and permissions are “per-user”

    Much more simple to manage. Many people may disagree, but its my NAS so… ???? Just make sure you use strong passwords and that’s it.. Also, its bad practice to keep changing passwords every 180 days,,

    Companies used to do this in the past ,thinking it was more secure changing regularly, but all it REALLY did was ****** off employees.

    Sorry, i manage my own security

  3. not gonna lie I wasn’t thinking 20 minutes later all i’d hear is change password and scan for malware, that hardly keeps the NAS secure, if I had a good password to begin with my security isn’t increased by changing it constantly. and doing a malware scan isn’t keeping me secure, stopping malware get on my system would be. and being notified of the lack of security is moot and not keeping me secure. password, update and scan malware. that takes 20 seconds. I thought you were going to show us how to disable certain ports, etc.

  4. Very BASIC security settings but the best security for QNAP is to keep all services OFFLINE completely so I absolutely NEVER use QNAP Cloud!

    As of January 2023 QNAP still has major online security issues so I will not trust QNAP online servers, nor cloud services and especially not email notifications handled by QNAP.

    For email notifications to be sent…QNAP needs QNAP email servers. Today QNAP products are still vectors for ransomware so please Do NOT connect to QNAP servers!

    Novice QNAP users should be offline ONLY, therefore should not be using notifications nor QNAP Cloud.

  5. Is myqnapcloud the only thing that “connects us to the internet.”

    So my question is as long as I disconnect from myqnapcloud then a large majority of my risk goes away?

  6. Have you done a video on how to set up let’s encrypt SSL for secure remote access to a NAS?

    I’m just a simple Plex user and moved awhile ago, that whole time my Nas was unplugged and unused for 2 years and I recently plugged it back in after setting up a media room. My NAS wouldn’t update firmware so I updated it manually with a flashdrive and I needed to make a whole new mycloud account for some reason. It’s been a pain getting it all set up but it’s currently in sleep mode. Am I still safe?

    I did manage to set up 2FA on admin and basic user account and I’ll see about setting up the X failed password revoking privileges

  7. Worker with a reliable hacker is what I think is all over the world and I recommend a hacker parfait who works with good heart and sincerity Dee_hack11 is in Seoul☝️☝️☝️.

  8. If i don’t have QNAP Cloud installed, does that mean that i am not connected to the internet?
    Is sending email notification not a good idea, considering i don’t want to link my NAS to the internet?

  9. *I was hit, so unplugged, shutdown, external USB backs fine. Plex user, was watching at the time no issues, went to update saver denied, then found the splash screen, no on reboot, water gapped on an independent switch no WiFi etc, it instantly goes to initialization. So save to assume the service themselves have been affected. Did safe shutdown. After some time I turn on everything then I found out I’ve been truly hit by deadbolt. I did as many research as I could and I found out that scott can actually decrypt the encrypted files So I paid some money not upto what deadbolt team are asking, then he decrypted my files*

  10. Forgive that this may be a stupid question. But – if you have a QNAP NAS plugged in to your computer – and your computer is connected to the internet – does that mean your NAS is connected to the internet also? Or – is the hacking security risk purely for if you choose to directly connect the NAS to the internet (and therefore if you don’t, you risk free)?

  11. I don’t have the QuFirewall and the SSecurity Counselor available sadly, at least it just doesn’t want to install. Probably because my NAS is way too old, running QTS 4.2.6

  12. Hi, do you know if it’s really interesting for speed access to QTS ? Can you make a speedtest and give results ? And is it possible do this with HDD already used for RAID5 and QTS installed on them ? Thanks for answer !

  13. hello sir your videos is so helpfull for me but i am confuse with how to configure alnet ssystem software with qnap nas storage i have configure qnap nas storage raid 6 with 4tb *12 hdd 1 hdd in spare but i am able to see live video but not able save nas storage so can you help me how to add path in qnap nas storage for save recording. Thanks,Jerry Upadhyay

  14. I wish I saw this video before ???? apparently Qnap got hit with a massive ransomware attack this year and I had no idea. My files are all encrypted by some hacker asking for Bitcoin in exchange for passwords ????

  15. Changing the default port does not enhance security. Security by obscurity. Port scanners can detect open ports it might fool some scripts.

    Most people who serious about securing administrative interfaces dont expose them directly to the internet period.
    Thats terrible terrible terrible security pratice.

    A seperate vpn server with a dedicated vlan for admin is what you should be using to secure the admin interface and remotely managing the nas.

    Setup vlan 100 for management
    Setup vlan 201 for cifs
    Setup vlan 202 for iscsi

    Setup vlan 300 for public network (internet)

    Setup vpn server in dmz with one arm into the public network (300) another arm into vlan 100.
    Setup logging and auditing.
    Ensure 2fa exists for vpn service.

    The qnap should have ports trunked with vlan 100,201,202 or dedicated ports.
    Assign the services ip addresses in each of the ranges.

    I never ever bother changing port numbers it simply offers very little security and may just elude some scripts scanning on certain ports