In recent years, the complexity of the debugging process has increased considerably due to the addition of the Network Xu Program and other advanced features. While advanced packet capture tools such as wireshark can provide diagnostic assistance for developers, this is beyond the knowledge of the average user. But as early as 2018, Microsoft had built a network diagnostic tool, Packet Mon, into the Windows operating system.
PacketMon is known to provide features such as packet capture, filtering, packet drop detection, and counting, and can intercept packets in routes across the network stack.
More recently, Microsoft has also added new features to the PacketMon tools for Windows 10 and Windows Server 2019 with the May 2020 update (Version 2004).
Packets can be captured in multiple locations on the network stack;
The loss detection, the reason for the drop bag report;
Supports the filtering of packets encapsulated at runtime;
Provide flexible packet counters;
Monitoring packets can be implemented on the screen;
Provides high-volume memory logging;
Compatible with existing NetMon and Wireshark (pcapng) tools.
Of course, PacketMon has its limitations. Because it only supports use within Ethernet, is not integrated with the firewall, and the drop-off reporting feature applies only to supported components.
Interested friends can run the pktmon.exe command, or the Windows Administration Extension in Windows Server to access Monitor Packet Mon.