Blog Layout

How to use Windows as an Evolve Virtual Appliance

Threat Intelligence • August 10, 2021

Evolve provides the ability to generate pre-configured Evolve Virtual Appliances for a variety of platforms, such as VMware, Hyper-V, AWS, Azure and Docker – as detailed within our Getting Started with the Evolve Virtual Appliance blog post.


In addition to these platforms, a Windows host can always be utilised as an Evolve Virtual Appliance, as detailed in the steps below.


Step 1: Download the VPN Gateway configuration from the Evolve Console. Navigate to Security Zones > Gateways and click the Download button for the relevant VPN Gateway:

step 1 - windows evolve virtual app

Step 2: Evolve will provide a ZIP file with the required configuration files, including your corresponding Evolve Certificate for trusted encryption and authentication.


Step 3: Download an OpenVPN client from the following source:



Step 4: Unzip VPN gateway configuration into the:


  • C:\Program Files\OpenVPN\config


Step 5: Rename evolve.conf to evolve.ovpn


Step 6: Navigate to the Control Panel > Network and Sharing Centre > Change Adapter Settings. Enable Internet Connection sharing on your LAN interface, typically named Ethernet, selecting the OpenVPN TAP interface to share with:

step 6 - windows as an evolve virtual app

Step 7: Change OpenVPN TAP interface back to DHCP addressing*:


  • Step 7.1:
step 7.1 - windows evolve virtual app
  • Step 7.2:
step 7.2 - windows evolve virtual app

*The sharing will set a static IP, which we don’t want.


Step 8: Connect VPN, there will be an OpenVPN GUI as an option:

step 8 - windows evolve virtual app

Step 9 – Done!


You’ll see traffic going across VPN to host on the network:

step 9 - windows evolve virtual app 1

And traceroute too:

step 9 - windows evolve virtual app 2

Now that we’ve shared how to use Windows as an Evolve Virtual Appliance, book a demo with our Cybersecurity Experts and see how Evolve can augment your security team with specialist security automation and orchestration capabilities.

remote work security
By Threat Intelligence January 31, 2022
There are many factors to take into consideration when staff work remotely. For any organisation, maintaining ongoing visibility over staff devices, the applications in your environment and network traffic is essential.
By Threat Intelligence January 24, 2022
In this blog we will explore the benefits of embracing agile methodologies, whilst ensuring AppSec becomes an integral part of the SDLC.
By Threat Intelligence January 17, 2022
In this blog, we will explore the benefits of cloud, some of the important security implications you need to consider before transitioning, and how expert guidance can help you avoid potentially devastating breaches.
Share by: