Implement Network Security Solutions for Data Flow
In this lab, you will learn how to implement network activity monitoring and use a protocol analyzer. First, you will use Resource Monitor to identify active network connections and the associated remote IP addresses, and then monitor network data flow by using TCPView. Next, you will track network data flow with NetWorx, and then use Wireshark to observe network data flow. Finally, you will use Wireshark display filters to evaluate network data flow.

Overview
In this lab, you will learn how to implement network activity monitoring and use a protocol analyzer. First, you will use Resource Monitor to identify active network connections and the associated remote IP addresses, and then monitor network data flow by using TCPView. Next, you will track network data flow with NetWorx, and then use Wireshark to observe network data flow. Finally, you will use Wireshark display filters to evaluate network data flow.
