WireGuard for Windows has been designed from the ground-up to make full use of standard Windows service, ACL, and CLI capabilities, making WireGuard deployable in enterprise scenarios or as part of Active Directory domains.
While consumer users are generally directed toward wireguard-installer.exe, this installer simply takes care of selecting the correct MSI for the architecture, validating signatures, and executing it. Enterprise admins can instead download MSIs directly and deploy these using Group Policy Objects. The installer makes use of standard MSI features and should be easily automatable. The additional MSI property of DO_NOT_LAUNCH
suppresses launching WireGuard after its installation, should that be required.
The "manager service" is responsible for displaying a UI on select users' desktops (in the system tray), and responding to requests from the UI to do things like add, remove, start, or stop tunnels. The "tunnel service" is a separate Windows service for each tunnel. These two services may be used together, or separately, as described below. The various commands below will log errors and status to standard error, or, if standard error does not exist, to standard output.
A tunnel service may be installed or uninstalled using the commands:
> wireguard /installtunnelservice C:\path\to\some\myconfname.conf
> wireguard /uninstalltunnelservice myconfname
This creates a service called WireGuardTunnel$myconfname
, which can be controlled using standard Windows service management utilites, such as services.msc
or sc
.
If the configuration filename ends in .conf
, it is interpreted as a normal wg-quick(8)
configuration file. If it ends in .conf.dpapi
, it is considered to be that same configuration file, but encrypted using CryptProtectData(bytes, "myconfname")
.
The tunnel service may be queried and modified at runtime using the standard wg(8)
command line utility. If the configuration file is a .conf.dpapi
one, then Local System or Administrator permissions is required to interact with it using wg(8)
; otherwise users of wg(8)
must have Local System or Administrator permissions, or permissions the same as the owner of the .conf
file. Invocation of wg(8)
follows usual patterns on other platforms. For example:
> wg show myconfname
interface: myconfname
public key: lfTRXEWxt8mZc8cjSvOWN3tqnTpWw4v2Eg3qF6WTklw=
private key: (hidden)
listening port: 53488
peer: JRI8Xc0zKP9kXk8qP84NdUQA04h6DLfFbwJn4g+/PFs=
endpoint: 163.172.161.0:12912
allowed ips: 0.0.0.0/0
latest handshake: 3 seconds ago
transfer: 6.55 KiB received, 4.13 KiB sent
The PreUp
, PostUp
, PreDown
, and PostDown
configuration options may be specified to run custom commands at various points in the lifetime of a tunnel service, but only if the correct registry key is set. See adminregistry.md
for information.
The manager service may be installed or uninstalled using the commands:
> wireguard /installmanagerservice
> wireguard /uninstallmanagerservice
This creates a service called WireGuardManager
, which can be controlled using standard Windows service management utilites, such as services.msc
or sc
.
When executing wireguard
with no arguments, the command first attempts to show the UI if the manager service is already running; otherwise it starts the manager service, waits for it to create a UI in the system tray, and then shows the main manager window. Therefore, wireguard /installmanagerservice
is suitable for silent installation, whereas wireguard
alone is suitable for interactive startup.
The manager service monitors %ProgramFiles%\WireGuard\Data\Configurations\
for the addition of new .conf
files. Upon seeing one, it encrypts the file to a .conf.dpapi
file, makes it unreadable to users other than Local System, confers the administrator only the ability to remove it, and then deletes the original unencrypted file. (Configurations can always be exported later using the export feature of the UI.) Using this, configurations can programmatically be added to the secure store of the manager service simply by copying them into that directory.
The UI is started in the system tray of all builtin Administrators when the manager service is running. A limited UI may also be started in the system tray of all builtin Network Configuration Operators, if the correct registry key is set. See adminregistry.md
for information.
The manager and all tunnel services produce diagnostic logs in a shared ringbuffer-based log. This is shown in the UI, and also can be dumped to standard out using the command:
> wireguard /dumplog > C:\path\to\diagnostic\log.txt
Alternatively, the log can be tailed continuously, for passing it to logging services:
> wireguard /dumplog /tail | log-ingest
Or it can be monitored in PowerShell by piping to select
:
PS> wireguard /dumplog /tail | select
Administrators are notified of updates within the UI and can update from within the UI, but updates can also be invoked at the command line using the command:
> wireguard /update
Or, to log the status of that command:
> wireguard /update 2> C:\path\to\update\log.txt
One could have Task Scheduler run it daily at 3am:
> schtasks /create /f /ru SYSTEM /sc daily /tn "WireGuard Update" /tr "%PROGRAMFILES%\WireGuard\wireguard.exe /update" /st 03:00
The tunnel service creates a network adapter at startup and destroys it at shutdown. If there are no more network adapters, the driver may be removed with:
> wireguard /removedriver
Or, to log the status of that command:
> wireguard /removedriver 2> C:\path\to\removal\log.txt