IT Monitoring Tool

Windows Network Monitoring Tools: The No-BS Technical Guide for Systems Engineers

If you’ve ever sat at your desk at 2 pm, a packet capture open in one window and a lukewarm Red Bull in your hand, staring at a NIC that’s dropping frames for absolutely no reason you can discern, this guide is for you. Windows network monitoring tools are not created equal and knowing which one to reach for (and when) is the difference between a 15-minute fix and a 4-hour IRC rabbit hole where you question your career choices.

This is the sub-page to Windows Monitoring Tools: The #1 No-BS Killer Guide, so we’re going deep on the network stack specifically. We’re covering built-in Windows network monitoring tools, best-in-class third-party options, and where enterprise platforms like Monro Cloud Monitoring actually make sense versus where they’re a bazooka aimed at a fly.

Let’s get into it.

Windows Network Monitoring Tools
Windows Network Monitoring Tools

Here’s the short version of Windows network monitoring tools and where they fit.

Problem / search intentBuilt-in Windows toolsBest specific third-party toolsWhere Monro Cloud Monitoring Fits
Wi-Fi dropouts, roaming issues, auth failuresnetsh wlan show wlanreport for a 3-day Wi-Fi event report, plus Microsoft-Windows-WLAN-AutoConfig/Operational in Event Viewer; Microsoft also documents ETW-based wireless troubleshooting. (Microsoft Support)PRTG for access point / controller monitoring, especially its Access Point Monitoring and Cisco WLC Access Point Overview sensor; Wireshark if you need packet-level proof of where the connection is failing. (Paessler – The Monitoring Experts)Yes, but only for AP/controller health, not for fixing a single Windows client’s dropout directly. Monro Cloud Monitoring is good when the AP, WLC, or switch port is what you want to watch over SNMP.
App bandwidth on a Windows PCnetstat for active TCP connections and IPv4/IPv6 stats, plus Performance Monitor for broader network counters. That gives you clues, but not a polished per-app bandwidth view. (Microsoft Learn)NetLimiter for per-application bandwidth monitoring and control; GlassWire for app-level network monitoring and alerts; SolarWinds NTA if you want application/protocol/IP visibility across the network rather than just one PC. (NetLimiter)Usually not the right tool. Monro Cloud Monitoring is better for host/interface metrics than for per-process bandwidth on an endpoint. That is an inference from its SNMP/interface-focused network monitoring model.
Overall NIC bandwidth / saturationPerformance Monitor and netstat are the built-in starting points for seeing traffic and connection activity. (Microsoft Learn)PRTG bandwidth sensors; SolarWinds NTA for real-time bandwidth monitoring, and interface-level analysis. (Paessler – The Monitoring Experts)Yes. This is one of Monro Cloud Monitoring’s best fits: SNMP-based interface traffic, bandwidth usage, packet loss, and interface error rates.
Also possible with a simple agent & pure cloud setup.
IPv4 vs IPv6 reachability / path issuesipconfig shows IPv4 and IPv6 addresses; ping tests reachability; tracert traces the path using ICMP or ICMPv6; nslookup checks DNS resolution. (Microsoft Learn)Wireshark when you need to see the actual packets; PRTG or SolarWinds if you need ongoing monitoring of latency or path-related symptoms over time. (Wireshark)Limited fit. Similarly to PRTG and SolarWinds, Monro Cloud Monitoring can watch the devices and interfaces along the path, but it is not a path-diagnostics tool like ping, tracert, or Wireshark.
Wireless vs wired comparisonOn the client side, Windows points you to WLAN-AutoConfig/Operational for wireless issues and Wired-AutoConfig/Operational for wired issues. (Microsoft Learn)PRTG if you want to monitor APs, controllers, or switch ports centrally; Wireshark if you need to compare what the wireless and wired traffic actually looks like. (Paessler – The Monitoring Experts)Yes for the infrastructure side. Monro Cloud Monitoring is useful for the AP, switch port, or NIC metrics behind the scenes, not for deciding whether Wi-Fi itself is behaving differently from Ethernet on one laptop.
NIC faults, errors, link flapsPerformance Monitor and netstat are the built-in places to start for interface activity and counters. (Microsoft Learn)Zabbix is a very good fit here; PRTG and SolarWinds are also strong if you want polished dashboards and alerts. (Zabbix)Yes — strong fit. This is exactly the sort of interface-level monitoring Monro Cloud Monitoring is designed for.
Deep packet analysis / “what exactly is happening?”Windows built-ins are limited here. netstat and the wireless report can give clues, but not full packet detail. (Microsoft Learn)Wireshark is the clear choice for packet capture and protocol analysis. (Wireshark)Not a good fit. Monro Cloud Monitoring is for monitoring metrics and health, not packet capture.

Table of Contents


The Landscape of Windows Network Monitoring Tools

Before we get specific, let’s establish what “network monitoring” actually means in a Windows environment, because it means different things depending on whether you’re:

  • A sysadmin trying to figure out why Karen in accounting can’t load SharePoint.

  • A network engineer watching SNMP logs from a switch.

  • A security engineer doing incident response on a host that’s beaconing somewhere in Eastern Europe.

  • Someone just sent an email from a shared mailbox that caused a P1 ticket at 2am and you want to find the guilty party before the morning standup.

Ok so that last one is a bit specific, but it’s still fresh on my mind and I can’t afford a psychiatrist.

Windows network monitoring tools span all of these scenarios, and the right tool depends almost entirely on what layer of the stack is misbehaving and whether you’re watching one endpoint or your entire infrastructure. That distinction (single host versus fleet) is the most important axis when evaluating any Windows network monitoring tools.


1. Wi-Fi Dropouts, Roaming Issues, and Auth Failures

Windows Network Monitoring Tools: Wi-Fi Dropouts
Windows Network Monitoring Tools: Wi-Fi Dropouts

The Problem

Wireless issues are the herpes of enterprise IT: they’re embarrassing, they keep coming back, and half the time you can’t even tell anyone what caused it. A user drops off a call, reconnects, and by the time you look at the logs the association event is gone. Fun.

Built-in Windows Network Monitoring Tools: netsh wlan show wlanreport

This is your first stop, every time, no exceptions. Run it as Administrator:

netsh wlan show wlanreport

This generates an HTML report in C:ProgramDataMicrosoftWindowsWlanReportwlan-report-latest.html covering the last three days of wireless events pulled from the Microsoft-Windows-WLAN-AutoConfig/Operational event log. Open it in a browser and you’ll see:

  • Association and disassociation events with timestamps.

  • Authentication failures (this is where 802.1X disasters show their face).

  • Signal strength graphs for each connection session.

  • BSSID transitions (roaming events).

For 802.1X auth failures specifically, you want to cross-reference with Event Viewer > Applications and Services Logs > Microsoft > Windows > WLAN-AutoConfig > Operational. Filter on Event ID 8001 (successful association) and 8003 (disconnection) to build a timeline. Event ID 11005, 11006, and 12011 are your EAP/PEAP failure codes – if you’re seeing those, the conversation is between the supplicant, the NPS server, and your RADIUS infrastructure, not the AP.

For ETW-based wireless tracing (when you need to go deeper than the operational log):

netsh trace start scenario=wlan capture=yes
# Reproduce the issue
netsh trace stop

This drops a .etl file you can open in Microsoft Network Monitor, Message Analyzer or convert with netsh trace convert for a .cap file.

Third-Party: PRTG and Wireshark

PRTG is the right tool when the problem isn’t one laptop – it’s the AP, the WLC, or a particular switch port. PRTG’s Cisco WLC Access Point Overview sensor can poll your Wireless LAN Controller via SNMP and show you AP association counts, client load distribution, channel utilization, and rogue AP detection – all in a single dashboard. If you’re running Aruba, Meraki, or Ruckus, PRTG has vendor-specific sensors or you can build SNMP-based custom sensors against the MIBs.

Wireshark comes out when you need to prove, at the packet level, exactly where the handshake is dying. For 802.11 captures you need a monitor-mode capable adapter (your standard Intel or Realtek NIC is useless here). A four-way EAPOL handshake that never completes is the smoking gun for PSK mismatch. A completed association followed by a DEAUTH frame with reason code 2 (“Previous auth no longer valid”) points at your WLC’s session timeout or RADIUS accounting issues.

Where Monro Cloud Monitoring Fits

Monro Cloud Monitoring is excellent for WAP and WLC health monitoring over SNMP – interface counters, client counts, CPU/memory on the controller, and alerting when client counts drop abnormally (which often precedes widespread dropout complaints).

It is even more powerful when you install the agent you received in your welcome email. This can be particularly useful if you have identified the cause of the issue and would like to monitor the warning signs.

E.g. I worked at a business where users would get locked out of their accounts. The service desk would tell them it was because they have cache Wi-Fi credentials on their phone and you can imagine how quickly the user said “nope, I have already checked”. 1 hour later after I had sifted through RADIUS server logs, I found the MAC address, found the model of phone, told them and suddenly “ohh thats my old phone”.

If I had identified the failed Wi-Fi password as Event ID 1234, then Monro Cloud Monitoring (and the agent) can be used to track that activity on devices. If you have a problem user, install the agent on their laptop and as soon as you see the failed Wi-Fi password event pop up in the dashboard, you know they are about to have an account lockout.

What it won’t do is help you debug why a specific Windows client dropped. For that, you’re back to wlanreport and Wireshark.


2. Per-Application Bandwidth Monitoring on Windows

Windows Network Monitoring Tools: Per App Bandwidth Monitoring
Windows Network Monitoring Tools: Per App Bandwidth Monitoring

The Problem

Someone is saturating the uplink and you need to find out who. Or, your backup job says it’s running but the WAN utilisation graph says otherwise. Or, you’re trying to QoS-shape traffic and you need to know what’s actually generating it before you can classify it. Windows makes this harder than it should be.

Built-in Windows Network Monitoring Tools: netstat and Performance Monitor

netstat -b -n 5

The -b flag shows the executable associated with each connection, -n avoids DNS lookups (faster), and 5 refreshes every 5 seconds. This is useful for catching active connections but hopeless for bandwidth accounting – you’re seeing a connection list, not bytes transferred.

This is mine, you can see OneDrive, Microsoft Edge and Steam (I just took a 1 minute gamin break I swear).

Black console screen showing network connections for OneDrive, Edge, and Steam processes, with IP addresses and states.

Performance Monitor (perfmon) has the Network Interface object with counters like Bytes Sent/sec and Bytes Received/sec, but these are per-NIC, not per-process. Performance monitor is really for file system, Registry, and process/thread activity – not applications. You can correlate Process > IO Data Bytes/sec with Network Interface counters if you’re doing manual forensics, but you’re basically building a pivot table in your head. It’s not pretty.

Resource Monitor is the simplest way to see what a device is doing. If you see a video streaming app taking 6000b/sec then you know why Karen is saying everything is slow.

Windows Resource Monitor showing network activity, processes, data sent/received, and network utilization graphs.

Resource Monitor (resmon.exe) is the underrated hero here – its Network tab shows active connections and running send/receive rates per process, in real time, right out of the box. It’s not a logging tool, but for a quick “who the hell is using all my bandwidth” answer during an incident, open Resource Monitor before you install anything.

Third-Party: NetLimiter, GlassWire, SolarWinds NTA & Monro Cloud Monitoring

NetLimiter is the specialist here. It hooks into the Windows network 8stack at the driver level and gives you per-application bandwidth monitoring with historical logging, rate limiting, and per-process firewall rules. In other words, if you want to install something on a PC and see why there is 400GB per day coming from that IP – NetLimiter is a good place to start.

You can cap a specific process’s upload or download rate, which is genuinely useful for managing backup agents, antivirus definition updates, or that one developer who decided to rsync 400GB of test data without telling anyone. The monitoring interface shows real-time and historical per-app stats, and you can export to CSV.

You can see historical data too, so it’s great to install on a users PC when they call to complain about Wi-Fi being slow, let it run in the background and tomorrow go through the results together.

It can even limit the applications bandwidth, so if the user has a genuine app consuming 400GB per day, this is a quick and dirty way to stop that from happening.

NetLimiter 4 network monitoring tool displaying application activity, including µTorrent limits and a traffic chart.

GlassWire takes a more security-flavored approach – it monitors per-application network activity, alerts you when new applications first access the network (useful for detecting unauthorized software phoning home), and keeps a historical bandwidth log with a timeline view. It’s more user-friendly than NetLimiter and integrates with VirusTotal for connection reputation checks. For an engineer who wants both bandwidth visibility and basic network behavior alerting on endpoints, GlassWire is excellent.

SolarWinds NTA (NetFlow Traffic Analyzer) is the answer when you need this visibility across the network rather than a single host. NTA ingests from your routers and switches and gives you top talkers, top applications, and interface-level bandwidth consumption with historical trending. It won’t give you Windows process names (that’s not how NetFlow works), but it will tell you which host is generating the traffic, what ports and protocols are involved, and over what time period.

That being said NextGen firewalls or proxies would be the obvious choice for identifying where peaks of traffic are coming from within the network.

Where Monro Cloud Monitoring Fits

Monro Cloud Monitoring is not built for per-process bandwidth monitoring. Its strength is SNMP-based interface counters and agent-based host metrics. You can write a custom UserParameter or use an external script to pull per-process network stats and feed them into Monro Cloud Monitoring, but you’re reinventing NetLimiter badly.

Monro Cloud Monitoring can be used to identify where traffic is coming from in the network. If you have it installed on a fleet of 50 PC’s in the network, the devices will accurately report network in and network out. Limits can be configured to raise alerts if a user exceeds the data limit you define.


3. Overall NIC Bandwidth and Saturation Monitoring

Windows Network Monitoring Tools: Link Saturation Monitoring
Windows Network Monitoring Tools: Link Saturation Monitoring

The Problem

The interface is at 100%. Or it’s at 70% and the dev team is complaining about latency. Or you think it might be approaching saturation, but you need to prove it with data before anyone will approve a link upgrade. These are infrastructure-level questions that need infrastructure-level answers.

Built-in Windows Network Monitoring Tools: Performance Monitor and netstat

In Performance Monitor, add the Network Interface object counters:

  • Bytes Total/sec — total throughput (bytes, not bits — multiply by 8 for Mbps)

  • Packets/sec — useful for detecting PPS-bound saturation on high-packet-rate workloads

  • Packets Received Errors — your first indicator of physical layer problems

  • Packets Outbound Errors — output queue saturation or driver problems

  • Output Queue Length — non-zero values mean you’re already dropping or queuing; sustained values above 2 are a problem

You can log these to a Data Collector Set (DCS) in Perfmon for historical analysis. Right-click Performance Monitor > Data Collector Sets > User Defined > New > Data Collector Set, choose manual configuration, and select your network counters. Set a sample interval appropriate to your troubleshooting window — 10 seconds for an active incident, 60 seconds for trend analysis.

netstat -e gives you a point-in-time snapshot of cumulative interface statistics (errors, discards, bytes). Not great for trending but useful for checking whether errors are accumulating over a test period.

Third-Party: PRTG and SolarWinds NTA

PRTG’s bandwidth sensors include the SNMP Traffic sensor (for switch/router interfaces), the Windows Network Interface sensor (via WMI, for Windows hosts), and NetFlow-based sensors for deeper traffic breakdown. For a Windows server NIC you care about, the WMI-based interface sensor gives you Mbps in/out, utilisation percentage, and error rates — with alerting and historical graphing. Set thresholds at 70% and 90% utilisation and you’ll get early warning before anyone notices the slowdown.

SolarWinds NTA adds the traffic decomposition layer – not just how much bandwidth, but what traffic is consuming it, broken down by IP, protocol, application, and conversation. If the interface is saturated, NTA tells you which top talkers are responsible and over what time window. Combined with SolarWinds NPM (Network Performance Monitor), you get interface health, bandwidth trending, and traffic composition in one pane.

☝️Confused? I personally struggled to see what saturation monitoring was for. If you need to know what PC or server is eating up 92% of the 1 link, that’s what a firewall can show you. 

💡Conclusion. For my brain to understand why anyone needs NTA, it came down to real world examples. If your gigabit link is at 92% saturation, that’s easy to isolate the host causing by checking your firewall, but you don’t have details like application traffic, 7-day trends or capacity forecasts (when will it hit 100%). If you need detailed network analytics, use something like SolarWinds NTA.

This diagram helps to explain it.

Where Monro Cloud Monitoring Fits

This is one of Monro Cloud Monitoring’s best use cases. SNMP-based interface monitoring combined with agent level monitoring is what Monro Cloud Monitoring was built for.

This simplified platform allows you to see detailed interface traffic (like traffic details from a Windows server) through to networking traffic (like link utilisation on your Palo Alto firewall). It will graph your bandwidth, calculate utilisation as a derived item, and alert you when thresholds are breached.

For Windows or Linux hosts with the Monro Cloud Monitoring agent installed, you can use net.if.in[<ifname>] and net.if.out[<ifname>] directly.

For SNMP-managed switches, routers and firewalls, Monro Cloud Monitoring’s SNMP polling works excellently. The built-in network interface discovery rule can automatically add monitoring items for all interfaces on a device. Packet loss (net.if.in[,errors]) and interface error rates are also natively supported. If you want bandwidth monitoring without paying SolarWinds prices, Monro Cloud Monitoring is a genuinely excellent answer here.


4. IPv4 vs IPv6 Reachability and Path Issues

Windows Network Monitoring Tools: IPv4 vs IPv6
Windows Network Monitoring Tools: IPv4 vs IPv6

The Problem

Your application works over IPv4 and breaks over IPv6. Or vice versa. Or DNS is resolving to an AAAA record when the application can’t handle IPv6. Or the path is fine on IPv4 and 400ms longer on IPv6 because your ISP’s IPv6 peering agreements are apparently managed by someone who studied routing in 1998.

This is one of the more annoying categories of issues that Windows network monitoring tools have to handle, because you’re chasing address-family-specific behavior that only manifests at runtime. You need to test reachability and trace paths for both stacks.

Built-in Windows Network Monitoring Tools: ipconfig, ping, tracert, nslookup

ipconfig /all – start here. Confirm the host has both IPv4 and IPv6 addresses, check that the default gateway exists for both families, and verify DNS server assignments. A link-local IPv6 address (fe80::/10) and no global unicast address means your DHCPv6 or SLAAC isn’t working.

ping with address family flags:

# Force IPv4
ping -4 google.com

# Force IPv6
ping -6 google.com

# Direct host ping (bypasses name resolution ambiguity)
ping 8.8.8.8
ping 2001:4860:4860::8888

tracert traces the path. The important flags:

# IPv4 path
tracert -4 monrocloud.com

# IPv6 path  
tracert -6 monrocloud.com

# Don't resolve hostnames (faster, avoids DNS noise)
tracert -d monrocloud.com

For more path diagnostic power, pathping combines tracert and ping – it runs trace-style hop discovery and then sends packets to each hop for 25 seconds to measure loss and latency at each hop individually. It’s slow (it tells you exactly how long it’ll take) but the output is significantly more informative than a standard tracert when you’re hunting for which hop is introducing loss.

nslookup for DNS diagnostics:

# Check A record
nslookup -type=A monrocloud.com

# Check AAAA record
nslookup -type=AAAA monrocloud.com

# Query a specific DNS server
nslookup monrocloud.com 8.8.8.8

# Verify reverse DNS
nslookup 2001:4860:4860::8888

If your app is connecting over IPv6 when you expected IPv4, nslookup shows what DNS returned, and Windows then decides which address to try first using its built-in prefix policy rules. Microsoft recommends checking those prefix policies with netsh interface ipv6 show prefixpolicies rather than disabling IPv6.

Third-Party: Wireshark, PRTG, and SolarWinds

Wireshark for dual-stack problems is invaluable when the OS-level tools don’t tell you enough. You can filter for icmpv6 or icmp separately, watch the actual DNS transaction to see which record the resolver returns, and observe address selection behavior in real time. Use ip.version == 6 or ip.version == 4 as display filters to separate the stacks.

PRTG and SolarWinds are the right answer when you want ongoing monitoring of IPv4 vs IPv6 reachability to a target.

Where Monro Cloud Monitoring Fits

Monro Cloud Monitoring can ping both IPv4 and IPv6 targets using the icmpping and icmppingsec items, and you can create separate items for each address family if needed. It’s reasonable for monitoring ongoing reachability and latency to known targets.

However, Monro Cloud Monitoring is not a path diagnostics tool – it won’t replace tracert, pathping, or Wireshark when you’re actively investigating a routing problem. Think of it as the thing that detects the IPv6 reachability loss; think of the built-in tools and Wireshark as the things that tell you why it happened.


5. Wireless vs Wired Performance Comparison

Windows Network Monitoring Tools: Wireless vs Wired
Windows Network Monitoring Tools: Wireless vs Wired

The Problem

“The Wi-Fi is slow.” Is it though? Wireless vs wired performance comparison is one of the trickier things to nail down with Windows network monitoring tools because you need to hold the application and server variables constant while changing only the interface type.

Is it slow compared to the wired interface on the same machine? Is the wired interface also slow? Is the problem actually at the switch, the AP, the links, or the application server?

Built-in Windows Network Monitoring Tools for Wireless vs Wired

On the wireless side, Microsoft-Windows-WLAN-AutoConfig/Operational (already discussed) is your primary event source. On the wired side, the equivalent is Microsoft-Windows-Wired-AutoConfig/Operational in Event Viewer, which covers 802.1X authentication events for Ethernet – useful if you’re doing port-based NAC and wired machines are failing auth.

For quick bandwidth comparison between interfaces on the same Windows machine:

# Get all network adapters with stats
Get-NetAdapterStatistics | Select-Object Name, ReceivedBytes, SentBytes

# Check current link speeds
Get-NetAdapter | Select-Object Name, LinkSpeed, Status, MediaType

# Compare real-time throughput by adapter
Get-NetAdapter | Get-NetAdapterStatistics

The Get-NetAdapter cmdlet with LinkSpeed is the first sanity check – if the Wi-Fi adapter is showing 54 Mbps link speed and the switch port is 1Gbps, you have your answer before any packet analysis begins.

For a proper benchmark comparison, iperf3 is the right tool (it runs fine on Windows) – run it wired, note the throughput, swap to wireless and run again. This eliminates application and server variables and isolates the interface as the variable.

Third-Party: PRTG and Wireshark

PRTG is the infrastructure answer – monitoring the AP, the switch port, and the server NIC simultaneously lets you rule in or out each segment independently. If the switch port utilisation is fine, the AP radio is fine, and the Windows NIC is fine, the problem is somewhere in the application path, not the network infrastructure.

Wireshark for wired vs wireless comparison lets you look at TCP window scaling, retransmission rates, and RTT differences between the two interfaces. A high retransmission rate on wireless but not on wired, with similar window sizes, confirms the wireless path is introducing loss. Filter on tcp.analysis.retransmission to see retransmissions and tcp.analysis.ack_rtt to see ACK round-trip times per stream.

Where Monro Cloud Monitoring Fits

Monro Cloud Monitoring is useful here for the infrastructure side – monitoring the switch port that the wired machine is connected to (error rates, utilisation, link state changes), the AP the wireless machine is associated with, and the server NIC at the other end of the connection.

It gives you the supporting evidence for a wireless-vs-wired comparison, even if it won’t run the comparison itself. It shows the switch port is error-free and the AP is operating normally, you’ve eliminated the infrastructure as a suspect.

A practical setup for “the Wi-Fi is slow” is: monitor the Wi-Fi adapter and the Ethernet adapter on the same laptop separately, then add ICMP checks (icmpping, icmppingloss, icmppingsec) to the client, gateway, or AP.


Windows Network Monitoring Tools: NIC Faults
Windows Network Monitoring Tools: NIC Faults

The Problem

The NIC is lying to you. Or the cable is. Or the switch port is. Or all three, collectively, in a conspiracy against your sanity. NIC faults and link flaps represent a category where the right Windows network monitoring tools can make the difference between catching a degrading interface before it causes an outage versus finding out about it from the helpdesk queue.

Link flaps, CRC errors, input errors, output drops – these are the kinds of problems that show up as intermittent application performance issues that nobody can reproduce on demand, usually reported at the worst possible time. “It was slow for like 30 seconds and then it was fine.” Great. Thanks.

Built-in Windows Network Monitoring Tools for NIC Faults

Performance Monitor counters for NIC fault detection, but the key counters to watch are:

  • Packets Received Errors – CRC errors, framing errors, overruns arriving from the wire

  • Packets Outbound Errors – transmission failures; often indicates output queue saturation or driver problems

  • Packets Received Discarded – packets received but dropped due to buffer exhaustion (software-side problem)

  • Packets Outbound Discarded – similar on the transmit path

A NIC with a rising Packets Received Errors counter and no corresponding errors on the switch port points at a bad cable, a duplex mismatch, or a failing NIC. If you see errors on both the NIC and the switch port, the cable or SFP is usually at fault.

For link state events (link flaps), Event Viewer > System with source e1iexpress (Intel NIC), tcpip, or your vendor’s driver name will show link up/down events. You can filter by event ID or source and correlate timestamps with application incident reports.

In PowerShell:

# Check for NIC driver events in System log
Get-WinEvent -FilterHashtable @{LogName='System'; ProviderName='e1iexpress'} -MaxEvents 50

# Check adapter status
Get-NetAdapter | Select-Object Name, Status, LinkSpeed, FullDuplex

# Check for errors via WMI
Get-WmiObject Win32_PerfRawData_Tcpip_NetworkInterface | 
  Select-Object Name, PacketsReceivedErrors, PacketsOutboundErrors

Third-Party: Monro Cloud Monitoring, PRTG, and SolarWinds

This is genuinely one of Monro Cloud Monitoring’s strongest use cases. Monro Cloud Monitoring SNMP-based interface monitoring with IF-MIB::ifInErrors, IF-MIB::ifOutErrors, IF-MIB::ifInDiscards, and IF-MIB::ifOutDiscards gives you continuous error rate monitoring with alerting – you’ll know about a rising error rate before the application team does.

Set a threshold trigger on errors per second (not total errors, since that always rises – use the change() or avg() functions in Monro Cloud Monitoring trigger expressions) and you’ll get a page when a NIC or port starts degrading.

Link flap detection in Monro Cloud Monitoring works via IF-MIB::ifOperStatus – you can create a trigger that fires when an interface transitions to down, with a problem confirmation delay to avoid false alarms from brief transients. The SNMP trap receiver can also ingest linkDown and linkUp traps from switches, giving you near-real-time detection of port state changes.

PRTG has similar capabilities with its SNMP Traffic sensor and can display error rates, discards, and link state history with a clean GUI and mobile alerting. SolarWinds NPM adds interface availability statistics and can detect flapping interfaces by tracking the number of operational state changes over a time period – an interface that toggles 20 times in an hour is flagged as unstable.


7. Deep Packet Analysis: When You Need to Know Exactly What’s Happening

Windows Network Monitoring Tools: Deep Packet Analysis
Windows Network Monitoring Tools: Deep Packet Analysis

The Problem

Everything else has failed to give you an answer. The SNMP counters look fine. The event logs look fine. The user swears it’s broken. The application vendor says it’s a network problem. The network vendor says it’s an application problem. You need a packet capture, because packets don’t lie (and if they do, that’s actually a much more interesting problem).

Built-in Windows Network Monitoring Tools: The Packet Capture Options

netstat gives you connection state but not content. The wireless report gives you 802.11 management frame summaries but not data frames. You can use netsh trace to capture an ETL trace:

netsh trace start capture=yes maxsize=500 traceFile=C:tracescapture.etl
# Reproduce issue
netsh trace stop

But the ETL format requires either Microsoft’s tooling to parse or conversion to PCAP. Wireshark can open ETL files natively since version 3.4, which is handy. Alternatively, convert:

etl2pcapng capture.etl capture.pcapng

The pktmon tool (Packet Monitor), built into Windows 10/Server 2019 and later, is an underrated alternative:

# List available components
pktmon comp list

# Add a filter for a specific port
pktmon filter add -p 443

# Start capture
pktmon start --etw --pkt-size 0

# Stop and convert to PCAP
pktmon stop
pktmon etl2pcap PktMon.etl

pktmon can capture at multiple points in the network stack simultaneously (NDIS, VFP, vSwitch layers) which is valuable for Hyper-V or container environments where you need to see traffic at both the VM vNIC and the physical NIC.

Third-Party: Wireshark

Wireshark is the answer. There is no competition. It captures packets from any interface Windows exposes via Npcap (its capture driver), applies real-time display filters, does protocol dissection for hundreds of application protocols, reassembles TCP streams, follows SSL/TLS sessions if you supply the session keys, and decodes 802.11 management frames if you capture in monitor mode.

The display filter language alone is worth a week of learning:

# TCP retransmissions only
tcp.analysis.retransmission

# TLS handshake failures
tls.alert_message.desc

# DNS queries taking more than 100ms
dns && frame.time_delta > 0.1

# ICMP destination unreachable
icmp.type == 3

# HTTP 5xx responses
http.response.code >= 500

# Specific IP pair conversation
ip.addr == 192.168.1.100 && ip.addr == 10.0.0.1

The Statistics menu provides conversation summaries, endpoint bandwidth totals, IO graphs, and round-trip time calculations. The Analyze menu includes the Expert Information panel which automatically flags retransmissions, zero windows, resets, and other TCP anomalies.

For capturing on a remote Windows host without installing Wireshark there, use pktmon or netsh trace to capture, then copy the PCAP to your analysis machine.

Where Monro Cloud Monitoring Fits

It doesn’t. Monro Cloud Monitoring is a monitoring and alerting platform, not a packet analysis tool. There is no scenario where Monro Cloud Monitoring is the right tool for deep packet inspection. This is not a criticism of our own tool; it’s just a different class of problem.

Monro Cloud Monitoring tells you that something is wrong; Wireshark tells you what is wrong at the byte level. Use both, in that order.


Choosing the Right Windows Network Monitoring Tools: Decision Framework

Understanding which Windows network monitoring tools to deploy in a given scenario is more valuable than knowing any single tool deeply. When you get paged, here’s the decision tree that should run in your head:

Is this one host or infrastructure?

  • One host → Start with Windows built-ins (wlanreport, netstat, perfmon, pktmon). Add Wireshark if you need packet-level evidence.

  • Infrastructure → Zabbix, PRTG, or SolarWinds depending on what you have deployed.

Is the problem wireless?

  • Yes, single client → netsh wlan show wlanreport, check Event Viewer WLAN-AutoConfig/Operational

  • Yes, multiple clients or AP health → PRTG Cisco WLC sensor or Zabbix SNMP monitoring of the controller

  • Yes, need to see the actual frames → Wireshark with monitor-mode adapter

Is the problem bandwidth-related?

  • Per-application on one host → NetLimiter or GlassWire, or Resource Monitor for quick triage

  • Per-interface on one host → Performance Monitor, Get-NetAdapterStatistics

  • Per-interface across infrastructure → Zabbix SNMP interface monitoring, PRTG bandwidth sensors

  • Traffic composition (who’s sending what) → SolarWinds NTA

Is the problem errors or link stability?

  • One host NIC → Performance Monitor error counters, Event Viewer driver events

  • Switch ports or infrastructure NICs → Zabbix is excellent here; PRTG and SolarWinds also strong

Is the problem IPv4/IPv6 reachability?

  • Active troubleshooting → ping, tracert, pathping, nslookup, Wireshark

  • Ongoing monitoring → Zabbix ICMP check items, PRTG ping sensors

Do you need packets?

  • Always → Wireshark. No further questions.

Summary

Windows network monitoring tools form a spectrum from “built into the OS and free” to “enterprise platform with a price tag that you can never unsee.” The right set of Windows network monitoring tools for your environment depends on whether you’re diagnosing a single host or watching an entire infrastructure, and matching the tool to the problem’s scope, layer, and urgency is the entire game.

The built-in Windows network monitoring tools – netsh wlan show wlanreport, netstat, ipconfig, tracert, pathping, pktmon, and Performance Monitor – cover a remarkable amount of ground for single-host troubleshooting and should always be your first stop. They’re always available, require no installation, and leave no residue when you’re done.

Third-party Windows network monitoring tools like Wireshark, NetLimiter, and GlassWire fill the gaps the built-ins leave behind like; deep packet analysis, per-process bandwidth monitoring, and user-friendly alerting on endpoint network behavior. These are the specialists.

Enterprise-class Windows network monitoring tools like Monro Cloud Monitoring, PRTG, and SolarWinds NTA are infrastructure monitoring platforms – they’re the right answer when you’re watching dozens or hundreds of devices, need historical trending, and need alerting that wakes someone up before users notice. Monro Cloud Monitoring in particular is an excellent fit for SNMP-based interface monitoring, NIC error tracking, and link state alerting – things that require continuous polling and historical data to be meaningful.

No single set of Windows network monitoring tools covers everything. The engineers who resolve network incidents fastest aren’t the ones who know one tool deeply – they’re the ones who know which tool to reach for in the first ten seconds of triage, and they’ve spent time across the full spectrum of Windows network monitoring tools available to them.