

Netsh Trace – built-in to operating system.Network Monitor 3.4 (Netmon) – (NOTE: Network Monitor is no longer under active development).The Optionsįirst, let's cover each of the tools that can be used to collect a network trace, in order from older to newer

Please note that when reviewing traces, you can use one or more of these tools and aren't necessarily tied to what was used to collect the trace.

While colleagues have created blogs on getting a trace with a single tool, I wanted to provide a location that someone can bookmark to be a single set of instructions for a number of solutions. There are many solutions you can use and choosing the right one often depends on the scenario. One thing I always run into with my customers is that they often don't know the best or easiest solution to get a network capture. With my networking background, I have spent years reviewing network captures. This is Michael Rendino, a Premier Field Engineer from Charlotte, NC and former member of the CTS networking support team. First published on TechNet on Dec 27, 2016
