Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Networking

Screenshots: Five easy-to-use IP traffic monitors

By Jack Wallen November 11, 2015, 6:02 AM PST

Image
1
of 5

Intro
Intro
Screenshots: Five easy-to-use IP traffic monitors

Introduction

Image: iStockphoto.com/cosinart

Introduction

For systemrnadmins, one of the most important tasks is keeping an eye on the network. Whenrnthings go bad in your world, a rogue ne’er-do-well could be the cause. Whetherrnthat malicious entity is a hacker, a compromised system, or a bad piece ofrnhardware, it’s essential to sniff out the issue.

To that end,rnyou need the right tools. One of the first tools you might turn to is an IPrntraffic monitoring tool. The good news is that there are tons of these toolsrnready to serve you. The bad news… some of them are a bit complex. That’s why Irnthought I’d find the easiest IP traffic monitoring tools and list five of themrnfor your network monitoring pleasure.

Note: This gallery is also available as an article.

Image: iStockphoto.com/cosinart
Microsoft Network Monitor
Microsoft Network Monitor
Screenshots: Five easy-to-use IP traffic monitors

Microsoft Network Monitor

Microsoft Network Monitor

This tool gives you quick network monitoringrnin just a couple of clicks. You won’t find too many bells and whistles gettingrnthe way as you sniff out issues. The application is free and will work onrnWindows XP/Vista/7/8/2003/2008.

Umit
Umit
Screenshots: Five easy-to-use IP traffic monitors

Umit

Umit

Umit mightrnseem a bit familiar, because it resembles the more popular nmap front end, Zenmap. The main difference between the two is thatrnUmit places all the necessary tools in an easily accessible toolbar–whereasrnZenmap places the same tools in menus. Umit is free, but unlike therncross-platform Zenmap, it’s available only for Linux.

Capsa Free
Capsa Free
Screenshots: Five easy-to-use IP traffic monitors

Capsa Free

Capsa Free

The freernversion of this tool does suffer from a number of limitations not found inrneither Capsa Professional or Capsa Enterprise. For a comparison matrix of the three versions, check here.rnCapsa includes a much busier user interface, but that highlights some of thernoutstanding features (especially the real-time graphing tools). I highlyrnrecommend giving the free version a try and then, if it fits your needs,rnpurchasing either the Professional or Enterprise edition to gain even morernpower.

The Dude
The Dude
Screenshots: Five easy-to-use IP traffic monitors

The Dude

The Dude

One handyrnfeature is the ability to manually add devices and even set up various types ofrnmonitors for each device. This means you can set up specific monitors to keep arngranular watch on every machine attached to your network. The Dude is free andrnfor Windows only.

  • Networking
  • Software
  • Account Information

    Share with Your Friends

    Screenshots: Five easy-to-use IP traffic monitors

    Your email has been sent

Share: Screenshots: Five easy-to-use IP traffic monitors
Image of Jack Wallen
By Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media. He's covered a variety of topics for over twenty years and is an avid promoter of open source. For more news about Jack Wallen, visit his website jackwallen.
  • Account Information

    Contact Jack Wallen

    Your message has been sent

  • |
  • See all of Jack's content

TechRepublic Premium

  • TechRepublic Premium

    Shadow IT policy

    Shadow IT is a concept whereby an organization’s employees use technology, services or systems without the knowledge of or approval from the IT department. It has arisen due to several reasons: Advances in cloud computing, which involve the usage of applications or sharing of data in public environments previously owned by IT. The evolution of ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 2:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Auditing and logging policy

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 3:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Vendor contract renewal planner

    Determining how and when to renew support contracts can be tedious and time-consuming. Our vendor contract renewal planner will help you schedule support renewals and budget the related costs. From the planner: Some companies schedule their support contract renewals to take effect all at once, such as on January 1. This provides a convenient renewal ...

    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 12:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Access management policy

    Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...

    Downloads
    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 4:00 PM EST Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice