Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Hardware

Spotlight: Microsoft Network Monitor 3.3

By Mark W. Kaelin August 13, 2009, 6:36 AM PDT

Image
1
of 6

Spotlight: Microsoft Network Monitor 3.3

Parsers tab

Parsers tab

The Parsers tab allows you to create and modify the various parsers. This would come in handy to debug an application that uses a custom protocol, for example.

Images by Justin James for TechRepublic

Spotlight: Microsoft Network Monitor 3.3

New cpature

New cpature

When you start a new capture, you can select which network adapters (including VPN connections) that you wish to monitor. If you do not select the VPN connection, then the traffic over that tunnel will still appear in the actual NIC itself, but the capture will not be aware of the data within tunnel beyond the bytes themselves going through it.

Images by Justin James for TechRepublic

Spotlight: Microsoft Network Monitor 3.3

In depth view

In depth view

This is what an in-depth view of an individual frame looks like. Because this is an HTTP transmission, and there is a parser for HTTP, you can see how the display can turn the data into a useful tree. This is a great feature because it lets you rapidly locate the exact information that you are looking for.

Images by Justin James for TechRepublic

Spotlight: Microsoft Network Monitor 3.3

Inspecting HTTPS

Inspecting HTTPS

Inspecting HTTPS communications is rather limited, because the data within the conversation (other than the initial headers) is encrypted. If you need to know what is inside SSL transmissions, you will need to use a proxy server of some type.

Images by Justin James for TechRepublic

Spotlight: Microsoft Network Monitor 3.3

Writing a filter

Writing a filter

When writing a filter, the UI can pop up a list of available items (similar to many code editors) based on what you have already typed. In this case, we are being shown the items below the TCP group that we can filter on.

Images by Justin James for TechRepublic

Spotlight: Microsoft Network Monitor 3.3

Filtered view

Filtered view

Here, we have applied a filter to show only the items in the currently selected branch of the conversation tree (in this case “All Traffic”) with a specific IP address in the destination. The address filters are flexible, and can filter on source, destination, or both.

Images by Justin James for TechRepublic

  • Hardware
  • Account Information

    Share with Your Friends

    Spotlight: Microsoft Network Monitor 3.3

    Your email has been sent

Share: Spotlight: Microsoft Network Monitor 3.3
Image of Mark W. Kaelin
By Mark W. Kaelin
Mark W. Kaelin has been writing and editing stories about the information technology industry, gadgets, finance, accounting, and tech-life for more than 25 years. Most recently, he has been a regular contributor to BreakingModern.com, aNewDomain.net,
  • Account Information

    Contact Mark W. Kaelin

    Your message has been sent

  • |
  • See all of Mark W.'s content

TechRepublic Premium

  • TechRepublic Premium

    Guidelines for building security policies

    PURPOSE These guidelines from TechRepublic Premium will help you define the necessary ingredients of a security policy and assist in its proper construction. They’re designed to work hand in hand with the subjective knowledge you have of your company, environment and employees. Using this information, your business can establish new policies or elaborate on those ...

    Published:  March 23, 2023, 12:00 PM EDT Modified:  March 24, 2023, 1:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Artificial intelligence architect

    PURPOSE Recruiting an Artificial Intelligence Architect with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY ...

    Published:  March 23, 2023, 12:00 PM EDT Modified:  March 24, 2023, 1:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Autonomous systems engineer

    PURPOSE Hiring the right Autonomous Systems Engineer requires a specific and precise recruitment process, supported by a thorough understanding of the project requirements. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, ...

    Published:  March 23, 2023, 12:00 PM EDT Modified:  March 24, 2023, 3:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Application support engineer

    PURPOSE This Hiring Kit: Application Support Engineer from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS AND SKILLSETS The skillset of successful Application Support Engineers is marked by balancing the technical expertise ...

    Published:  March 23, 2023, 12:00 PM EDT Modified:  March 24, 2023, 5:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice