Network packet capture
Note
Microsoft Message Analyzer has been deprecated. Information contained below is for archival reference only.
You can use Microsoft Message Analyzer to capture, display, and analyze protocol messaging traffic on your Windows 10 IoT Core device.
Prerequisites
Working PowerShell Connection (Step 1 to 8 described at PowerShell.
Set up your device
In order to connect to your device using Message Analyzer, you need to first rename your device. This can be done through SSH or
PowerShell using the setcomputername
command.
After you rename your device, reboot the device to apply the name change.
Turn off the firewall
Connect to your device using PowerShell or SSH and run the following command to disable the firewall.
netsh advfirewall set allprofiles state off
Connect to your device using Message Analyzer
Now that your device is set up, let's connect to it using Microsoft Message Analyzer.
Download the Microsoft Message Analyzer.
Open Message Analyzer.
Click on
New Session
.In the window that opens, click on the
Live Trace
button.Click on the
Edit...
button.Replace Localhost with the name of your IoT device, and enter the administrator user name and password. Then click
OK
.Click on the
Select a trace scenario
dropdown and selectLocal Network Interfaces
.Click the
Start
button.You should start to see the messages going through the network interfaces on your device.
After you start the trace through Message Analyzer, you can also view the ETW messages from the packet capture driver in your device's web interface. To do this, go to the ETW tab of the web interface, select
Microsoft-Windows-NDIS-PacketCapture
from theRegistered providers
dropdown menu, and click theEnable
button.