1. Home
  2. Proton VPN for PC

Proton VPN for PC — Windows client walkthrough

A working editorial walkthrough of Proton VPN for PC (Windows). Install flow from Microsoft Store and direct download, configuration steps that matter on first launch, kill switch and split-tunneling specifics, and Windows-platform-specific notes.

Read the protocols overview

01. What this page covers

Windows is the most-asked Proton VPN platform on the reader inbox.

The Proton VPN for PC client supports Windows 10 and Windows 11. Install flow runs from the Microsoft Store, the official Proton website direct download, or a Chocolatey package manager install. The Microsoft Store version handles updates automatically; the direct download requires manual update or in-client update notification.

First-launch configuration matters. Enable the kill switch (recommended on by default) which terminates internet traffic if the VPN connection drops, preventing IP leakage. Confirm DNS leak protection is on. Select WireGuard protocol for most users; switch to OpenVPN UDP only if WireGuard fails to connect on a specific network.

Split tunneling on Windows lets specific applications bypass the VPN connection. Useful for local-network printing, IPTV apps with regional licensing, or any app that breaks under VPN routing.

Read the protocols overview →

02. How it fits with the rest of the Proton VPN reference hub

How Proton VPN for PC fits broader platform coverage.

Mac, Linux, iOS and Android each have their own platform notes covered across the hub. The general vpn-download walkthrough covers download verification across all platforms.

Speed and performance vary by protocol, server, and underlying connection. The speed-and-performance page covers benchmarking on Windows specifically.

Threat-model framing applies regardless of platform; the security-overview and secure-vpn-connection pages document what a VPN actually protects.

Read the security overview →
Proton VPN for PC — install and config checklist
ItemDetailNotes
Step 1Choose install sourceMicrosoft Store or direct
Step 2Install clientStandard installer flow
Step 3Sign inAccount credentials
Step 4Verify kill switch onDefault on; confirm
Step 5Verify DNS leak protectionDefault on
Step 6Pick WireGuard protocolOpenVPN UDP fallback
Step 7Configure split tunneling (optional)If specific apps need bypass

Proton VPN for PC — reader questions

Five common questions reproduced from the reader inbox.

01. Does Proton VPN for PC work on Windows 10?

Yes. Windows 10 and Windows 11 both supported. Older Windows versions may work but are not officially supported.


02. Should I install Proton VPN for PC from the Microsoft Store or direct download?

Either works. Microsoft Store handles updates automatically; direct download requires in-client update.


03. What is the kill switch on Proton VPN for PC?

The kill switch terminates internet traffic if the VPN connection drops, preventing IP leakage. Recommended on by default.


04. Can I split-tunnel specific apps on Proton VPN for PC?

Yes. Split tunneling on Windows lets selected apps bypass the VPN. Useful for local printing or regionally-licensed apps.


05. Does Proton VPN for PC work with Windows Defender?

Yes. No conflicts in normal operation. Some third-party antivirus tools may need explicit firewall exceptions.

Methodology — how we research and revise

A reproducible methodology beats opinion-based recommendation at every horizon longer than a single subscription cycle.

The reader desk works from four recurring inputs. Weekly catalog and pricing scrapes capture promotional cycles and feature changes. Annual third-party security audits, when published by independent firms, inform the security overview pages. Reader inbox traffic — roughly 600 messages per week on the privacy-software beat — identifies the friction points real users hit. Published Swiss court rulings affecting the broader privacy-software ecosystem, when issued, drive event-driven jurisdiction-page updates.

Revision cadence is weekly for tracker pages, monthly for category explainers and event-driven for security audits, regulator actions or major policy changes. Every page carries a visible last-updated date in the byline. When facts change, the portal prefers visible revision notes over silent edits, because privacy-software readers benefit from seeing how context evolves rather than reading a static snapshot.

Independence is enforced, not claimed. Editors do not hold equity in any privacy-software provider, do not accept affiliate income from any provider, and decline partner-authored copy under any byline. Conflicts of interest, when applicable to a contributor's prior employment in privacy-software, surface at the top of the affected article rather than buried in disclosures footers. Reader donations and newsletter subscriptions are the only revenue streams. The Electronic Frontier Foundation and Privacy International archives provide external frameworks the reader desk consults.

Privacy-software market context in 2026

Understanding the broader privacy-software landscape helps shoppers evaluate any single offering in proper context.

The privacy-software market expanded materially through the 2020s as households became more aware of internet service provider tracking, public Wi-Fi exposure and the data-broker ecosystem. The post-2020 shift toward remote work pushed adoption further, particularly in households where employer-supplied corporate VPNs did not cover personal browsing.

Three structural dynamics shape the 2026 market. First, jurisdictional differentiation: providers domiciled outside major surveillance alliances (Switzerland, Panama, British Virgin Islands) have positioned legal independence as the central trust-building claim. Second, audit transparency: open-source clients with independent security audits have become table stakes for credible providers. Third, multi-product bundling: privacy companies have expanded from single-product offerings into broader privacy-tool ecosystems covering email, file storage, password management and calendar. The bundle math now competes directly with single-product specialty offerings.

Regulatory attention from consumer-protection bodies and privacy commissioners affects how providers communicate features. The Federal Trade Commission has issued guidance on VPN advertising claims; the European Data Protection Board issues rulings affecting EU-jurisdictions providers. The portal tracks regulator actions as event-driven inputs to coverage.

What this hub is and is not

A scope statement keeps reader expectations aligned with reality.

This hub is editorial. It does not sell subscriptions, does not run affiliate links, does not accept supplier placement fees and does not link to commercial properties from body content. Outbound links route to government, educational and editorial sources only. Reader donations and newsletter subscriptions are the funding model. The desk reads every inbound message and synthesises monthly into category-page revisions.

The hub is not the official site for any privacy-software product. Account creation, subscription billing, official client downloads and customer-support tickets all live on the relevant company's official property. Search the official URL directly when reaching for those functions. The disambiguation page covers this distinction in detail.