Windows Guide · · Approx. 22 min read

Install Mihomo Party on Windows 11: System Proxy and TUN First-Time Setup Guide

On Windows 11, Mihomo Party is a practical way to run the mihomo policy engine with a modern UI—without treating every subscription field like a research project. The hard part is rarely “where do I paste the link.” It is choosing between system proxy mode and TUN mode, then getting past SmartScreen, User Account Control, and the first Wintun driver install when you expect transparent capture. This guide walks the full install path, explains what each mode does on Windows, and focuses on the first-run permission and driver steps that cause the most support threads.

1. Why System Proxy and TUN Still Split Windows Traffic Differently

Mihomo Party is not a different protocol stack from other maintained Meta-family clients; it is a control surface for the same ideas you will see in references to mihomo across this site. On Windows 11, the operating system still exposes traffic to applications in two materially different ways. System proxy mode asks Windows to publish HTTP, HTTPS, and SOCKS endpoints—typically on 127.0.0.1—so programs that consult WinINET defaults or compatible proxy tables can follow your rules without adding a virtual adapter. TUN mode installs a virtual network interface (commonly backed by Wintun) and manipulates routes so packets can be steered into the core even when an application never reads proxy settings at all.

The confusion is that both toggles can look enabled while reality is split. Microsoft Edge may follow the system proxy immediately, a game launcher may ignore it entirely, and PowerShell may behave differently depending on whether you rely on the default Windows proxy table or export explicit HTTP_PROXY variables. Meanwhile, TUN can appear active in the UI while the driver never finished installing, another VPN still owns the default route, or DNS inside your profile disagrees with what the resolver stack is doing. Treating the two modes as different tools—not duplicates of the same switch—saves hours of reinstalling the same package.

If you are migrating from discontinued Clash for Windows habits, start with the alternatives and migration overview for ecosystem context. That article focuses on switching clients and preserving subscriptions; this one focuses on a clean Windows 11 install and the first decisions you make after subscription import.

2. Download and Install Mihomo Party on Windows 11

Start from a distribution channel you trust. For day-to-day installs, prefer the curated download hub on this site so you are not chasing stale mirrors when security fixes land. Download the Windows artifact your maintainer ships—often a signed installer or a portable-style package—then run it once with ordinary user rights and read the prompts instead of dismissing them on muscle memory.

Windows SmartScreen may warn that the app is uncommon or that reputation data is thin, especially on fresh builds. That screen is a reputation gate, not a guarantee of harm. If you intentionally chose a pre-release channel, expect more friction. When you trust the source, use “More info” and then “Run anyway” for that specific binary, or follow your organization’s software policy if IT manages the machine. Avoid stacking multiple clients that both try to own the same mixed port or TUN adapter; quit the old client completely—including tray icons—before you validate listeners inside Mihomo Party.

After first launch, confirm the embedded core actually started: the log view should be quiet about fatal YAML errors, and proxy groups should list nodes instead of empty placeholders. If the shell renders but the engine cannot bind ports because another process grabbed them, fix that conflict before you blame upstream nodes. Portable installs deserve a predictable working directory; scattering profiles across Downloads makes support conversations painful months later. If you like a comparison workflow on the same OS, the parallel Clash Verge Rev on Windows 11 guide uses the same conceptual split between system proxy and TUN mode, which helps you separate “client UI differences” from “Windows networking behavior.”

3. Subscription Import, Profile Activation, and Core Health Checks

Import your subscription URL, file, or clipboard payload using the client’s import flow, then activate the profile you intend to run. If you want a slower, field-by-field explanation of subscription hygiene, follow the subscription import tutorial before you tune modes. Once the profile loads, refresh node lists, open the log view, and confirm there are no parser errors. A broken profile makes every downstream test look like “TUN is broken” when the engine never had valid outbound definitions in the first place.

When subscription import fails with TLS or DNS noise, do not immediately jump to adapter debugging. The dedicated Windows subscription troubleshooting guide walks through log-first triage for handshake and resolver issues that look like “the client cannot update” but are often policy or network path problems on the local machine.

Pick two validation targets: something in the browser and something on the command line. Browsers are easy, but they also hide DNS and certificate details that matter for policy debugging. A small HTTPS fetch from PowerShell—after you understand which mode is active—helps separate “proxy ignored” from “node offline.” If CLI tools ignore proxies entirely, that is often a clue you are still in system proxy territory without explicit environment variables, not proof that your airport is down.

When you switch between modes, disable the previous mode cleanly. Leaving system proxy enabled while you experiment with TUN can create double capture or odd split routes. A conservative pattern is: turn off TUN, clear or reset system proxy through the client, apply changes, exit fully, relaunch, then enable only the mode you are benchmarking. It is slower than hammering toggles, but it eliminates phantom states that waste evenings.

4. System Proxy Mode: What Windows 11 Actually Applies

In system proxy mode, Mihomo Party asks Windows to populate the user-visible proxy configuration that also appears under Settings > Network & internet > Proxy. Applications that honor WinINET defaults, many Chromium-based browsers, and parts of the Microsoft stack will send HTTP and HTTPS traffic through the local listener the client exposes—commonly a mixed HTTP and SOCKS port on loopback. This path is attractive because it avoids installing a kernel-style adapter and often produces fewer scary elevation prompts up front.

The limitation is voluntarism. Programs that ship their own TLS stacks, bundle certificates, or use WinHTTP with a separate proxy table may ignore the setting you see in Settings. Command-line tools frequently need explicit HTTP_PROXY and HTTPS_PROXY variables, and some runtimes only read lowercase variants. Developers sometimes discover that one tool works while another does not because each consults a different configuration store. Games, anti-cheat stacks, and certain store-distributed apps are frequent offenders. On Windows 11, those mismatches feel like “the client is flaky” when the OS faithfully applied proxy data to the subset of processes that asked for it.

Practical checklist: enable the client’s system proxy toggle, confirm the listed local ports match your profile’s port, socks-port, or mixed listener, then open the Windows proxy page and verify the fields populated. If they remain blank, another utility may be fighting for the same configuration namespace, or the client may lack permission to write system settings. Resolve that before you assume the tunnel is the problem. For deeper routing concepts once traffic reaches the engine, skim the routing and rules reference on this site.

If browsers still feel “direct” while the client claims it enabled system proxy, check whether secure DNS is bypassing the resolver path you expect. The Chrome and Edge secure DNS article explains how DoH settings interact with system proxy assumptions on Windows in ways that look like routing bugs but are really resolver policy.

5. TUN Mode, Wintun, and Why Elevation Shows Up

TUN mode aims at completeness. Instead of politely suggesting proxies, the stack creates a virtual interface and adjusts routes so traffic can be steered into mihomo even when applications never read proxy keys. On Windows that power almost always intersects with Wintun, a lightweight tunnel driver maintained by the WireGuard project that many modern clients bundle. The first successful install typically triggers User Account Control because registering or updating a network driver is not a standard-user operation.

Expect DNS to become part of the story immediately. TUN setups frequently interact with fake-ip or custom DNS listeners declared in YAML. If the Windows resolver and your profile disagree, you can get “ping works, browser does not,” or the opposite, depending on which path each tool used. For conceptual background that is not limited to one operating system, read the TUN mode overview here; the capture story is the same even though Windows never uses the word “UWP” in the adapter dialog. When something fails, capture symptoms: does a query against a public resolver behave differently from the system resolver? That split tells you whether you are debugging TUN itself or DNS policy.

Beware friendly fire from other VPNs, zero-trust clients, or endpoint security that also installs filters or virtual adapters. Two products that both believe they own the default route is a recipe for intermittent failures. If you must stack tools, declare a clear primary: pause the corporate VPN when testing Mihomo Party, or configure explicit split tunneling rather than hoping both stacks negotiate politely after sleep and resume.

6. Picking a Default Mode for Everyday Use

As a rule of thumb, start with system proxy when your workload is mostly browsers, Electron productivity apps, and developer tooling you can wrap with environment variables. It is usually the gentler introduction: fewer kernel moving parts, quicker rollback, and straightforward inspection via the Windows proxy page. Move to TUN mode when you routinely meet applications that ignore proxies, when you want DNS behavior tightly coupled to your rules, or when you need VPN-like capture without abandoning Clash-style policy groups.

Power users sometimes keep system proxy for daily browsing but enable TUN only for debugging sessions or specific games. That hybrid can work if you are disciplined about toggle order and you know which shells still export stale proxy variables from last week’s experiments. Write down your default; future you will not remember whether Tuesday’s session left routes behind after hibernation.

Store apps and certain sandboxed executables introduce extra edge cases on Windows. If you already rely on TUN for those workloads, complement this guide with the dedicated TUN, UWP, and loopback article when loopback exemptions become the bottleneck—not every beginner needs that page on day one, but it saves hours when a single Microsoft Store client refuses to participate.

7. First-Time TUN Checklist: Driver, Adapter, Routes, and Conflicts

When you enable TUN mode for the first time, treat it as a short project rather than a single click. Step one: accept the UAC prompt that installs or updates the Wintun driver if the client asks for it. Declining elevation leaves the UI optimistic while the kernel never attaches the adapter you think you turned on. Step two: open ncpa.cpl and confirm a new interface appeared with sane status; if the adapter cycles between enabling and disabled, suspect conflicting software or a broken install.

Step three: verify routes and DNS together. A classic failure mode is “foreign sites work, domestic CDNs break” because policy order sent the wrong matcher first, not because TUN failed. Temporarily simplify rules—bypass huge rule providers—to confirm the tunnel path itself works before you restore complexity. Step four: reboot once after the first successful driver install. Windows networking state after sleep, Fast Startup, and hybrid graphics can leave stale bindings; a reboot is boring troubleshooting, but it clears a surprising number of ghost issues.

If you run third-party firewalls, remember they can block the helper or user-space components even when Windows Defender Firewall already allows the GUI. Whitelist the Mihomo Party binaries and the core process the client spawns, then retest. Document what you changed; “I clicked allow on something red” is not a reproducible security posture.

8. Troubleshooting: Common Errors and Misleading Symptoms

“System proxy is on, but only Edge works.” Check per-application proxy overrides, then export proxy variables for terminals. Remember that Visual Studio’s integrated terminal may not match your interactive PowerShell profile. Where possible, test inside a clean shell session to eliminate years of copied setx mistakes.

“TUN toggles on, yet nothing leaves the country.” Revisit driver installation and the default route. Pause other VPNs. Validate DNS inside the profile: fake-ip mismatches often masquerade as total breakage. Inspect logs for permission or bind errors rather than assuming the remote node died.

“UAC appears every single launch.” Suspect a failed service registration, an integrity check that rebuilds helpers, or multiple copies of the client in Downloads versus Program Files. Keep one canonical install path and update through consistent channels.

“Some domestic sites break when Mihomo Party runs.” That is rarely a Windows bug; it is policy. Ensure DIRECT paths exist for local destinations, refresh GEOIP data if you rely on it, and place specific domain rules ahead of aggressive catch-alls. The world map in the UI is pretty, but YAML order still wins arguments on the wire.

“Sleep or dock/undock broke my session.” Note whether interfaces reorder when you switch Wi-Fi or Ethernet. Some users cycle TUN off and on after network changes; others prefer system proxy for laptops that roam constantly. Pick the trade-off that matches how often you suspend the machine versus how badly you need full capture.

9. Frequently Asked Questions

What is Mihomo Party compared to the mihomo core?

Mihomo Party is a desktop GUI that manages profiles, subscriptions, logs, and mode toggles while the mihomo engine applies your YAML policy. You still think in terms of proxy groups, rules, and DNS modes—the client is the control plane on top of the core.

Do I need Administrator approval for TUN on Windows 11?

Expect UAC prompts the first time the Wintun driver registers or upgrades. Declining elevation often leaves TUN visibly on in an app UI while capture never attaches at the kernel; approve when you trust the build, install once cleanly, reboot if adapters misbehave, then retest routing.

When should I use system proxy vs TUN?

Start with system proxy for browser-heavy setups and workloads where you can set HTTP proxy–style variables where needed. Move to TUN mode when applications ignore proxies, when you want DNS tightly aligned with routing, or when you need adapter-level capture comparable to VPN clients.

10. Closing Thoughts

Installing Mihomo Party on Windows 11 is straightforward compared with the skill you build afterward: knowing when system proxy is enough, when TUN mode earns its complexity, and how to read UAC and Wintun prompts as part of the data plane instead of annoyances to dismiss. Import a healthy profile first, enable one mode at a time, validate with both GUI and command-line tools, and treat DNS plus rule order as first-class suspects whenever connectivity looks “almost right.” Compared with opaque midnight failures, that structured approach turns first-time configuration into a routine you can repeat on every new PC.

Many “first install” guides stop at toggles, which is why people bounce between clients without learning the Windows stack. Mihomo Party shines when you want a focused Meta-family experience with less ceremony than some all-in-one suites, but it still expects you to understand modes. Generic VPN apps often hide routing behind a single connect button—and then hide DNS and split tunneling behind support tickets when something breaks. That convenience trades away the log-first clarity that mihomo users rely on. A maintained Clash-family client keeps those observability hooks close to the surface so you can prove where a packet went, then fix the rule instead of rebooting hope. When you want builds and ecosystem context in one place before you standardize YAML across machines, consolidating downloads through a transparent hub beats chasing stray archives.

Source code and issue tracking for Mihomo Party are published in the mihomo-party-org/mihomo-party repository on GitHub. That link is for transparency and changelogs; for everyday Windows installers, continue to use this site’s download flow rather than treating GitHub as the primary distribution channel.

If you are ready to align installers across the machines you actually use, browse the official download hub after you finish tuning modes on this PC. Compared with juggling mismatched versions, one curated entry point keeps your client, core, and expectations in sync when you replace hardware. → Download Clash free and keep your Windows 11 Mihomo Party rollout consistent

Hand-picked deep-dives on the same topic — practical Clash routing guides in the same category.