Using a VPN with your RDP server is a great way to increase privacy and security. However, as you may have noticed, it's not always smooth sailing. Starting a VPN can cause you to lose connection to your RDP server. This is generally because the VPN routes all traffic through an encrypted tunnel, which your local PC cannot access.

That said, the situation is not uniform across VPN providers. Some work with RDP out of the box, while others require additional configuration. This guide will cover various popular VPNs and what you must do to get them working on a Windows RDP connection.

VPNs that work with RDP natively

A few VPNs do not require additional configuration to work with Remote Desktop Connections. In our testing, this included:

  • OpenVPN
  • Tunnelbear
  • Proton VPN

We'll try to keep this list updated. Let us know if you have problems with any of these VPNs or find additional providers that work out of the box.

VPNs that require additional configuration

Many VPNs don't work on RDP servers unless you change some settings. Unfortunately, the settings you must change aren't the same for every VPN client. This largely comes down to a difference in feature set – with some providers, you must turn off the kill-switch, whereas others have more advanced features, such as split tunnelling and local network sharing, that can help us out.

We'll cover most of the major VPN providers below. BitLaunch customers can contact support via our live chat if your VPN is not listed and does not work out of the box.

How to use Express VPN on an RDP server

You need to disable the kill-switch to use Express VPN without disconnecting from your RDP session.

To do so, press the hamburger icon in the top-left of your Express VPN client and choose "Options". Then, untick "Stop all internet traffic if the VPN disconnects unexpectedly" and press "OK".

Screenshot of the Express VPN client with the options menu open

You should now be able to use your VPN without issue. However, bear in mind that having the kill-switch disabled does increase the chance that your server's real IP address will leak. It's a good idea to check for DNS leaks using an online tool and take necessary precautions.

How to use Mullvad on an RDP server

Getting working perfectly with RDP is a little more involved. This is primarily because it provides more options, which we can exploit to minimize the risk of the VPN leaking your real DNS.

We'll take you through it step-by-step:

  1. Press the settings cog in the top right corner of your Mullvad client.
Screenshot of the mullvad VPN client with an arrow pointing to a cog icon in the top-right corner

2. Open the "VPN settings" window.

Screenshot of Mullvad settings with an arrow pointing to "VPN settings"

3. Toggle on the "Local network sharing" option.

Screenshot of the mullvad client with an arrow pointing to the "local network sharing" toggle.

4. Scroll until you see the "Use custom DNS server" option and toggle that on.

Screnshot of the Mullvad client with the custom DNS server option toggled on

5. Under the custom DNS heading, press "Add a server". Add the IP addresses "1.1.1.1" and "1.0.0.1" (or another private DNS provider).

Screenshot of the mullvad client with "1.1.1.1" and "1.0.0.1" added to the DNS options.

Using a custom DNS should prevent DNS leaks.

6. Go back to the main settings and open the "Split tunneling" options.

Screenshot of the mullvad settings interface with an arrow pointing to the "Split tunneling" heading

7. Toggle on Split tunneling next to its heading and press the "+" icon next to "Remote Desktop Connection" in the list below.

The "Split tunelling" feature toggled on with an arrow pointing to the plus next to "Remote Desktop Connection".

8. While still in the split tunnelling menu, press "Find another app".

The Split tunneling interface with an arrow pointing to a button that says "Find another app".

9. Navigate to "C:\Windows\System32\", find "svchost.exe", and press "Add".

Windows explorer interface with "svchost" selected annd the "Add" button highlighted.

It should now be safe to enable your VPN without disrupting your RDP connection. As always, you should check for DNS leaks before continuing.

How to use Nord VPN on an RDP server

Helpfully, Nord VPN has a dedicated option to allow remote access when the VPN is connected. Here's how to enable it step-by-step:

  1. Press the settings cog in the bottom left corner of your VPN client and click "Connection" in the main pane.
Nord VPN client with arrows pointing to the settings cog and connection heading.

2. Toggle on the "Allow remote access while connected to VPN" option.

Nord VPN client with "Allow remote access while connected to VPN" toggled on.

Check for DNS leaks using the IP leak site.

How to use Wireguard on an RDP server

Like Express VPN, you must disable the kill-switch in WireGuard to use it without being disconnected from your RDP session. Here'sentire full process:

  1. Click on the tunnel you use for your VPS server in your WireGuard client and press "Edit" in the bottom right corner.
WireGuard client with arrows pointing to a tunnel called "client" and the "Edit" button.

2. Untick "Block untunneled traffic (kill-switch)" in the bottom left corner and press "Save".

WireGuard ediot tunnel window with a red box around "Block untunneled traffic" and an arrow pointing to the save button.

That's it! Now, it's just a matter of checking for DNS leaks.