Networking

Download Microsoft Network Monitor 3.0

Microsoft Network Monitor 3.0 is a brand new protocol analysis tool. It has been under development for about 2 years at Microsoft. You are welcome to try it out and provide feedback to us. Key features of Microsoft Network Monitor 3.0 include:

  • A completely new user interface
  • Real time capture and display of frames
  • Simultaneous capture on multiple network adapters
  • Multiple simultaneous capture sessions
  • Network conversations and a tree view displaying frames by conversation
  • A new script-based protocol parser language, and script-based parsers
  • Support for Vista/Windows XP/Windows Server 2003
  • Support for 32bit and 64bit platforms

In order to download Network Monitor 3.0 you will need to sign in to the Microsoft Connect website and participate in the product. You will then get to download Network Monitor 3.0 for free.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

  1. Go to http://connect.microsoft.com
  2. Sign in with your passport account.
  3. Choose “Available Connections” on the left.
  4. Choose “Apply” for Network Monitor 3.0 (once you’ve finished with the application, the selection appears in your “My Participation” page).
  5. Go to the Downloads page (On the left side), and select the appropriate build 32 or 64 bit build.

Links

Microsoft Connects site

Network Monitor Blog

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: