Your internet connection can be influenced by several different factors. This includes factors such as malfunctions on the side of the Internet provider, improper operation of the modem, router and other network equipment, as well as increased network activity of programs.

Therefore, if you are sure that problems with the provider and equipment are excluded, then it is worth looking at the computer itself.

And the first thing to start with is to check the Internet activity of programs, that is, to see which applications connect to the Internet in this moment... Fortunately for us, the operating room Windows system has a free built-in tool that will help the user to track the increased network activity of applications.

To make sure that no applications in the background are using your Internet connection, you just need to use the built-in operating system"Resource Monitor" ("Windows Resource Manager"). Let's get started!

STARTING THE RESOURCE MONITOR... Most quick way, this is press the Win + R key combination on the keyboard. Then go to "Start" - "All Programs" - "Accessories" - "Run", where in the "Open" field enter "RESMON" and click "OK".

NETWORK ACTIVITY

In the Resource Monitor, open the "Network" tab, where you will see all processes with Internet activity, namely:

  • process name (its executable file);
  • ID (its identification number);
  • the average number of bytes per second received / sent since the start of the program.

You can control the process (pause / end) by right-clicking the context menu on the executable file of the required process.

If the process (executable) is unfamiliar to you, using the same context menu and the item "Search the Internet" you will read information about it.

In order to find out in detail which applications use the "svhost.exe" process, I recommend using the "Process Explorer" utility, which you can easily download from the Internet. That's all!

Our programs for system administrators will help to keep abreast of everything that happens in the computer park and the enterprise network, to respond in time to equipment failures and software problems, to minimize costs and downtime. This page provides tools for monitoring the network, servers and hosts, for PC inventory, accounting installed programs and licenses, creating reports on the "hardware" of computers, for traffic accounting, for researching LAN topology and creating graphical diagrams.

The system administrator may also find useful utilities for searching files in local networks and auditing user access to file resources of servers. All these tools will help the sysadmin improve the health of network devices and servers and ensure the proper level of security in the enterprise network.

10-Strike software is included in the unified register of Russian computer programs of the Ministry of Telecom and Mass Communications and can participate in state purchases.

Programs for administrators, network utilities

A program for inventory and accounting of the installed software and hardware on the PC of the enterprise. "Computer Inventory" allows system administrators to keep track of computers, view configurations of remote computers and lists of installed software, track configuration changes (hardware and software). The program contains a powerful report generator. For example, you can create reports on the presence of certain software on computers and its quantity... When planning upgrades you can create a report containing computers with insufficient disk or RAM... Windows XP / Vista / 7 / 8.1 / 10 are supported; Server 2003/2008/2012/2016/2019.


- program for administration and visual monitoring of servers and computers on the network, which allows you to observe the current state of devices in a graphical form at any time. LANState monitors devices and signals various events. LANState contains many functions useful for system administrators: sending messages, shutting down remote computers, scanning hosts and ports, receiving various information from remote computers (access to the registry, event log, etc.). Windows XP / Vista / 7 / 8.1 / 10 are supported; Server 2003/2008/2012/2016/2019.


- software for monitoring servers and other network devices, monitors the health of hosts / servers and notifies the administrator about problems. Find out in time about the failure that occurred (disconnection, running out of server disk space, service stoppage, etc.) and fix the problem with minimal loss of time. The software signals problems with sound, screen messages, e-mail, can run external programs, scripts and services, as well as restart computers and services. Windows XP / Vista / 7 / 8.1 / 10 are supported; Server 2003/2008/2012/2016/2019.


- program for searching files and documents on computers local network (via NetBios and FTP protocols). Enter the phrase or file masks and find necessary information... When viewing search results, the files found can be immediately opened, saved to disk, or generated a report. The search uses multi-threaded technology, which significantly speeds up the work. You can set filters by file size and modification date. Windows XP / Vista / 7 / 8.1 / 10 are supported; Server 2003/2008/2012/2016/2019.


- program for monitoring user access to shared folder and files, allows you to find out in time about the connections to the computer of the LAN users. The program beeps, displays notifications on the screen, and keeps a detailed log of connections, which records information about who and when connected to the computer's network folders, which files were opened, etc. Windows XP / Vista / 7 / 8.1 / 10 are supported; Server 2003/2008/2012/2016/2019.


3.0 FREE!

- scanner of local networks, IP addresses and hosts... This free program allows you to scan the local network and detect active hosts, computers and servers, as well as find open TCP ports. Supports IP range scanning and many protocols for discovering network devices (ICMP ping, port search, NetBios, SNMP, UPnP, ...). If you have administrator rights from Windows computers, you can count many useful information... Windows XP / Vista / 7 / 8.1 / 10 are supported; Server 2003/2008/2012/2016/2019.

Networking kits for sysadmins

System Administrator Kits allow you to save money when purchasing several of our products or all at once. Get three products for the price of two etc. For example, when buying Complete set of administrator programs in the option " to organize"(no limit on the number of jobs), consisting of our seven programs for system administrators, you can save up to 85,000 rubles or 30%!

Other utilities

- CD cataloger (CD, DVD)... With it, you will quickly find required files on CDs and DVDs of your collection. SearchMyDiscs helps you organize your CD and DVD collections, allowing you to find the disc you want in seconds. If you are tired of looking for the right disk every time, this tool is for you! Windows XP / Vista / 7 / 8.1 / 10 are supported; Server 2003/2008/2012/2016/2019.


- program for analyzing Raw log files of the Apache web server... Creates various reports and histograms on statistics of user access to the website, calculates direct file orders. The analyzer has many settings and filters that will allow you to get accurate information about your site, downloaded files, and who comes to you and from where. Windows XP / Vista / 7 / 8.1 / 10 are supported; Server 2003/2008/2012/2016/2019.

Payment and delivery

When ordering software by legal entities, payment by bank transfer is accepted. Invoices are issued electronically, an agreement is concluded. Electronic delivery: the distribution is downloaded from our website, registration keys are sent after payment by e-mail... After payment, the original contract and documents for accounting are sent to the buyer by mail.

Issue an invoice (indicate the required names of programs and types of licenses, your details and the name of the director for the contract)

All our products and licenses are also listed in the AllSoft Online Store (follow the "buy" links from our website).


Our clients: small and medium-sized businesses, government and budgetary institutions, hospitals, schools, colleges and institutes, banks, oil industry, telecoms.

If you want to find out how much traffic your Windows computer is using for certain time, then you need to use third-party solutions... In the Task Manager or Resource Monitor, only the current values ​​of network consumption are available, so these tools are not suitable for monitoring traffic over a specific period. Some routers and modems collect data on consumed traffic - you can view these values ​​by accessing the device admin panel.

Why monitor your traffic at all? Traffic accounting is simply necessary when using metered Internet connections, but it can also be useful on unlimited tariffs.

Some ISPs limit monthly traffic at certain rates. If the limits are exceeded, the user either needs to pay for an additional quota, or be content with a reduced connection speed until the end of the reporting period. Traffic monitoring allows you to avoid such unpleasant situations.

Traffic analysis allows you to better understand how much data you consume during the reporting period. This information will be useful when changing your Internet service provider or tariff plan.

The tools below are designed to track traffic on Windows computers... All programs are free and tested on computers running Windows 7 and Windows 10.

free utility to monitor traffic in Windows. The program monitors daily, weekly and monthly traffic consumption and displays a widget on the desktop with visualization of data transmission and reception processes.

Users can configure alerts, set provider restrictions and calculate traffic using the built-in calculator. BitMeter II allows you to run a counter, during which you can track various connection metrics.

The Statistics section displays data on traffic consumption for the last few hours, days and months. You can view them in graphical or tabular form.

GabNetStats

- portable program for devices Microsoft Windows, which allows you to track consumed traffic and other indicators. The program ran smoothly on all test systems and immediately started tracking traffic.

Left click on the system tray icon opens the graph and traffic statistics. The widget closes automatically after five seconds, but you can change this behavior and make the widget always appear on the desktop.

The program monitors the sent and received data bytes, the average connection speed and many other parameters. Select Advanced Statistics to view the total number of packets received and sent, the number of routes and IP addresses, and TCP / IP configuration information.

The developer's website is no longer available, but you can download the program from our site.

Note: to install this program in newer versions of Windows 10, it is recommended to configure compatibility with earlier Windows versions... To do this, right-click on the downloaded file and select Properties> Compatibility> Run program in compatibility mode for: previous version Windows.

NetSpeedMonitor shows inbound and outbound traffic in the notification area of ​​the taskbar (system tray). Hover your mouse over the icon to view traffic for a specific session, day, or month. Clicking the right mouse button opens the available parameters and interface of traffic statistics for a certain period.

The program is available as a separate installer and portable version. The utility is fully compatible with all modern versions of Windows.

Note: portable version gave an error in Windows 10 when trying to start without administrator rights.

When NetTraffic starts, it displays a graph of network activity on the desktop with the amount of data sent and received. By default, the window is always displayed in the foreground, but you can turn off this mode, resize the window and other work parameters.

A right click on the icon in the system tray opens access to parameters, statistics and additional tools. In the statistics section, you can see the traffic consumption for the selected period or for separate time intervals: month, day or year.

In the settings, you can change the design of the widget and set a quota for the volume of traffic. Available networking utilities include ipconfig, netstat, and route.

The program was distributed free of charge, now new versions have become paid. At the same time, the past, free version utilities (Networx 5.5.5) are still available for download on our website and have no functionality restrictions.

Immediately after launching Networx starts monitoring traffic consumption, and an application icon appears in the system tray. Double-clicking on the icon opens statistics: you can view general data, as well as data for the day, week, month, breakdown of data by application. For convenience, different views of the data are placed on separate tabs.

You can use the program to monitor the traffic consumed by individual applications. To do this go to Settings> General and in the section Observe connections enable the parameter Ignore local traffic (within the network).

Right click on the system tray icon to access additional features. You can turn on the display of the widget on the desktop to monitor traffic consumption in real time, start measuring the connection speed, or open the screen for setting quotas.

There are several network tools available to users such as trace route or ping.

comparison table

Unfortunately, some of the listed tools are no longer supported. Without a doubt, it is the most professional traffic monitoring solution with powerful functionality, but the free version of the utility is also no longer supported by the developer.

At the same time, it's worth noting that Microsoft is testing the built-in tool in Windows 10 (version 2003), which is expected to be released in spring 2020.

A hack employee is a disaster for any enterprise or company. Therefore, the question constantly arises of how to control an employee at his working computer and make sure that there are no illegal actions.

Immediately, we note that the employee must be notified (in writing, with a signature) that there is covert surveillance of a computer in the local network. Perhaps only this fact will already help to avoid violations and put the employee on the path of a “hard worker”. If not, then here is a solution for complete control over computers on a local network.

Local network control program

So, software called "Mipko Employe Monitor" - a version specifically for corporate networks.

After installation and launch, and you can start it from the desktop or by pressing "ctrl + alt + shift + k", you need to configure the user interface - what exactly needs to be monitored and controlled on the local network.

  1. 1. On the top left, there is a section where a user from your network is selected, whose log is being monitored at the moment: when expanded, a list of recorded actions will be displayed (depending on the settings).
  1. 2. Now directly about the "Tools" - "Settings" functionality. For each user, the "tracking" parameters can be configured individually.

Monitoring allows you to track the following actions:

  • - keystrokes;
  • - screenshots;
  • - activity in social networks;
  • - exchange of messages in "skype";
  • - visited websites;
  • - saving the clipboard;
  • - program activity;
  • - snapshots from a webcam;
  • - call recording;
  • - file operations.

Quite extensive functionality. The main things that employers are usually interested in when monitoring users on a local network are screenshots and visited websites.

In order not to face claims of interference in personal information(for example, if you set a view of the visited web pages and saw personal correspondence on social networks), block all social networks and chats, as well as a ban on the installation of third-party software - only what is required for work.

Remote monitoring of a computer on a local network

As a rule, the employer is interested in only two aspects - a screenshot of the computer of a local network user and his viewing of web pages (as mentioned above, employees are familiar with this information).

  1. 3. The settings for taking a screenshot include the following components:

  • - selection of a time interval, indicated either in minutes or in seconds;
  • - take a picture when opening a window;
  • - take a picture at the click of the mouse;
  • - do not take a picture when inactive;
  • - snapshot mode (full screen, window);
  • - and the quality of the picture.
  1. 4. In the "visited websites" section it is still easier: select the "type of interception" and whether to save a screenshot.

  1. 5. Now about where all this will be stored or sent. In the settings section "Sending":

  • - first, set the "Log type" and the pop-up list;
  • - set in what format the "HTML" report or "ZIP" archive will be saved;
  • - select the type of sorting and the time interval for sending the report;
  • - the most basic - where the report will be sent: to mail / ftp / folder on the computer.
  • - then enter your username and password, click "Apply".

That's it, now employees, as they say, "Under the hood" - you can monitor the users of the local network.

You probably know about the presence of a built-in firewall in it. You may also know how to allow and block access of certain programs to the network in order to control incoming and outgoing traffic. But did you know that the Windows firewall can be used to log all connections that go through it?

The Windows Firewall logs can be helpful in solving specific problems:

  • The program you are using cannot connect to the Internet, although this problem is not observed with other applications. In this case, to fix the problem, you should check if the system firewall is blocking the connection requests of this program.
  • You suspect that the computer is being used to transfer data malware and want to monitor outbound traffic for suspicious connection requests.
  • You have created new rules for allowing and blocking access and want to make sure that the firewall correctly processes the given instructions.

Regardless of the reason for its use, enabling event logging can be challenging as it requires a lot of configuration manipulation. Here is a clear sequence of actions on how to activate the registration of network activity in the Windows firewall.

Access to firewall settings

First, you need to go to the advanced settings of Windows Firewall. Open the control panel (right-click on the Start menu, the "Control Panel" option), then click the "Windows Firewall" link if the view mode is small / large icons, or select the "System and Security" section, and then "Windows Firewall" ”, If the view mode is category.

In the firewall window, select the option in the left navigation menu “Advanced Options”.

You will see the following settings screen:

This is the internal technical side of Windows Firewall. This interface allows you to allow or block program access to the Internet, configure incoming and outgoing traffic. In addition, this is where the event registration function can be activated - although it is not immediately clear where this can be done.

Access to log settings

First, select the option “Windows Firewall with Advanced Security (Local Computer)”.

Right click on it and select the "Properties" option.

This will open a window that can confuse the user. When you select the three tabs (Domain Profile, Private Profile, Public Profile), you will notice that their contents are identical, but refer to three different profiles, the name of which is indicated in the title of the tab. Each profile tab contains a button to configure logging. Each magazine will correspond to a different profile, but which profile are you using?

Let's take a look at what each profile means:

  • The domain profile is used to connect to the wireless Wi-Fi networks when the domain is set by the domain controller. If you are not sure what this means, it is best not to use this profile.
  • The private profile is used to connect to private networks, including home or personal networks, which is the profile you are most likely to use.
  • The public profile is used to connect to public networks, including restaurants, airports, libraries, and other institutions.

If you are using a computer on a home network, go to the “Private Profile” tab. If you are using a public network, go to the Shared Profile tab. Click the "Configure" button in the "Logging" section on the correct tab.

Activating the event log

In the window that opens, you can configure the location and maximum size of the log. You can set an easy-to-remember location for the log, but in reality, the location of the log file doesn't really matter. If you want to start event logging, in both drop-down menus “Record missed packets” and “Record successful connections” set the value to “Yes” and click “OK”. Continuous operation of the function can lead to performance problems, so activate it only when you really need to monitor connections. To disable the logging function, set the value “No (default)” in both drop-down menus.

Exploring magazines

Now the computer will record the network activity controlled by the firewall. In order to view the logs, go to the “Additional parameters” window, select the “Monitoring” option in the left list, and then in the “Logging parameters” section, click the “File name” link.

Then the network activity log will open. The contents of the log can be confusing for an inexperienced user. Let's take a look at the main content of the log entries:

  1. Date and time of connection.
  2. What happened to the connection. The “ALLOW” status means that the firewall allowed the connection, and the “DROP” status indicates that the connection was blocked by the firewall. If you are having problems connecting to the network a separate program then you can pinpoint that the cause of the problem is related to the firewall policy.
  3. Connection type - TCP or UDP.
  4. In order: the IP address of the source of the connection (computer), the IP address of the destination (for example, a web page) and the network port used on the computer. This entry allows you to identify ports that require opening for software to work. Also watch out for suspicious connections - they can be made by malware.
  5. Whether the data packet was successfully sent or received.

The information in the log will help you figure out the cause of the connection problems. The logs can also log other activity, such as target port or TCP acknowledgment number. If you need more details, see the “#Fields” line at the top of the log to identify the value of each metric.

Remember to turn off the logging feature after shutdown.

Advanced network diagnostics

By using the Windows Firewall log, you can analyze the types of data processed on your computer. In addition, you can determine the causes of network problems associated with the operation of the firewall or other objects that disrupt the connection. The activity log allows you to get acquainted with the work of the firewall and get a clear picture of what is happening on the network.