Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Server 2008 R2 High Network Bandwidth

Posted on 2014-03-08
2
291 Views
Last Modified: 2014-03-25
Hello,
We have a server that is using high amounts of network bandwidth. I want to see where its all going inbound/outbound. Whats the easiest way to achieve this? Also if it could be easy to read that would be great. Thanks
0
Comment
Question by:Cobra25
2 Comments
 
LVL 1

Expert Comment

by:mariofxp
ID: 39915521
From task manager, performance tab, you can access performance monitoring. Here, you can see, among others, all data regarding networking, associated with related tasks.

From command line, you can:
netstat -ano | find /i "establish"

Open in new window


To see which process is doing traffic with which IP. The last number is the process di, that you can see in task manager by enabling the pid Columbia.

You could also use wireshark to sniff traffic to make yourself an idea of what's happening.

Happy searching!
0
 
LVL 15

Accepted Solution

by:
ZabagaR earned 500 total points
ID: 39916050
You can download Microsoft Network Monitor 3.4

http://www.microsoft.com/en-us/download/details.aspx?id=4865

Your view will be broken down by what .exe is initiating your network request. It will also show the source and destination IPs.

Wireshark is free and does the same thing but I think network monitor 3.4 is more friendly if you're not familiar with sniffing traffic.

You could also download Process Explorer:
http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx

Under VIEW go to Select Columns at the bottom of the list. Go to the Process Performance tab. Select I/O Reads and I/O writes. You can then sort by either column. Sort high to low and see what processes are using the most I/O.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Setting up a Microsoft WSUS update system is free relatively speaking if you have hard disk space and processor capacity.   However, WSUS can be a blessing and a curse. For example, there is nothing worse than approving updates and they just have…
Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question