Learn about Microsoft Network Monitor tool - part 1

If you are constantly exposed and working with the Windows operating system, you will certainly feel that Microsoft Network Monitor is one of the tools to support the analysis and management of the best network system today with many function...

TipsMake.com - If you constantly have to contact and work with Windows operating system, you will definitely feel that Microsoft Network Monitor is one of the tools to support the process of analyzing and managing the best network system. Currently with many functions , including:

- Signal sent from any computer in the network

- The exact address of the computer receiving the data

- The protocol is used to operate

- Data format is being transmitted

And many other features. In the following article, we will introduce you to some features of this utility.

Capturing:

Technically, Microsoft Network Monitor will collect all data streams in the system based on processes, and this process is called capturing. You can use this tool to monitor information on all frames on the system or individual parts of a certain frame.

Use Capturing in what situations:

The decision to use this tool will depend on a number of certain factors involved. For example, if there is only 2 computers in a simple system, there are 2 possibilities: when or not to enable the Firewall feature.

In the determination on computer 1, the system will check and detect any packets that are being 'ignored' by the rules of inbound Firewall, and for computer 2, the same rule will be applied, but this time based on the firewall's outbound rules:

Learn about Microsoft Network Monitor tool - part 1 Picture 1Learn about Microsoft Network Monitor tool - part 1 Picture 1

In actual models, you can apply based on the diagram below:

- On the network of Windows 7 Client

- The entire system inside and outside the Firewall

- The components are managed by Exchange Server

Learn about Microsoft Network Monitor tool - part 1 Picture 2Learn about Microsoft Network Monitor tool - part 1 Picture 2

The monitoring process outside the Firewall system is only applied if the firewall's features have been set up with rules that ignore data streams that are not really needed. Thereby, even if these data streams are not through the Windows Client, it can still go through the Firewall and go to Exchange Server.

Collect data and use a cheat sheet:

When the network has become 'crowded' with more computers, it is recommended to use the cheat sheet to save the collected data. And in fact, there are problems that take days, even weeks, to be able to detect and process, because there are many data streams that are transmitted regularly in the system. Therefore, if you do not save this information, it will be very difficult and complicated if the system has problems.

The data to be saved includes:

- 'Symptoms' of the problem

- IP addresses of related computers

- Number of data packets analyzed

For example, suppose that we have 2 domain controllers, one is DC1 with IP address: 10.10.10.50 , and the remaining DC2 with IP address: 10.10.10.51 , the system has just completed the drive mapping. on DC1. The screenshot below is a Summary Frame parameter that includes the amount of traffic generated when the network drive is connected:

Learn about Microsoft Network Monitor tool - part 1 Picture 3Learn about Microsoft Network Monitor tool - part 1 Picture 3

Packets related to drives are components that start with SMBs - Small Message Block . If in any case an error occurs on the system and we receive the Access denied message, then we must immediately identify and analyze the packets during that time period. And the information recorded in the cheat sheet will look like this:

network drive mapping
lỗi thông báo - truy cập cho phép

source ip address = 10.10.10.50
destination ip address = 10.10.10.51

In more complicated cases, the administrator must try to record as much information as possible, so that if you encounter similar problems in the future, we will easily identify the main cause. corpses as well as how to fix them most effectively.

Clearly identify which information flows and data to store:

Technically, we can completely set, specify which parts of data to keep during the whole process. In fact, the system has 5 analytical templates available for users to choose, but if you want, we can still create your own templates. 5 samples of analysis available include:

- Pure : almost no analysis of any data stream and very limited filters

- HPC (High Performance Capture) : provides optimized filters, mainly focusing on the operating speed of the system, but is restricted with TCP and UDP protocols

- Faster Pasing : support some other protocols like ARP, HTTP, DNS, and NBTNS but not including SMB and SMB2.

- Default : default mode, applicable to all common protocols, including SMB, SMB2, and RPC.

- Windows : analyze all Windows-based and SQL-based protocols

In simple words, the more data relevant to the information contained in the analysis samples, the longer the process will take, the longer the system will take to identify the cause and respond to the user. use. This information is usually set up, before the administrator starts the process, and to select or switch between these forms, click Parser Profiles> NetworkMonitor Parsers:

Learn about Microsoft Network Monitor tool - part 1 Picture 4Learn about Microsoft Network Monitor tool - part 1 Picture 4

Adjust interface:

Depending on the requirements for each specific session, we can adjust, change Network Monitor 's main interface accordingly and achieve the highest efficiency. For example:

- Display or hide unnecessary windows

- Fixed the frequently used windows

- Change Simple external display interface, Diagnostic, Developer .

If you want to move a part of a window, just select and hold the Shift button, then drag and drop it from the previous position, and now you can move to any position that feels best:

Learn about Microsoft Network Monitor tool - part 1 Picture 5Learn about Microsoft Network Monitor tool - part 1 Picture 5

If you want to close, just press the button with the X icon at the top right of that window:

Learn about Microsoft Network Monitor tool - part 1 Picture 6Learn about Microsoft Network Monitor tool - part 1 Picture 6

To restore the default display mode, select View> Restore Default Layout:

Learn about Microsoft Network Monitor tool - part 1 Picture 7Learn about Microsoft Network Monitor tool - part 1 Picture 7

Learn about Microsoft Network Monitor tool - part 1 Picture 8Learn about Microsoft Network Monitor tool - part 1 Picture 8

The default interface of Microsoft Network Monitor

And below are some of the layout templates available:

Learn about Microsoft Network Monitor tool - part 1 Picture 9Learn about Microsoft Network Monitor tool - part 1 Picture 9

Diagnostic

Learn about Microsoft Network Monitor tool - part 1 Picture 10Learn about Microsoft Network Monitor tool - part 1 Picture 10

Developer

And if you want to save these changes in the layout, just click the Save As button as shown below:

Learn about Microsoft Network Monitor tool - part 1 Picture 11Learn about Microsoft Network Monitor tool - part 1 Picture 11

The Save As window is displayed, you want to name it with the extension * .cap ( Capture File ), then click the Save button:

Learn about Microsoft Network Monitor tool - part 1 Picture 12Learn about Microsoft Network Monitor tool - part 1 Picture 12

During the next use of Network Monitor , we will see the file system paths available and usable at any time:

Learn about Microsoft Network Monitor tool - part 1 Picture 13Learn about Microsoft Network Monitor tool - part 1 Picture 13

Good luck!

5 ★ | 1 Vote