Microsoft Message Analyzer Packet Analysis at a Higher Level. Neil B Martin Test Manager WSSC- Interop and Tools Microsoft Corporation



Similar documents
Introduction. Interoperability & Tools Group. Existing Network Packet Capture Tools. Challenges for existing tools. Microsoft Message Analyzer

NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT

Lab VI Capturing and monitoring the network traffic

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Interoperability Tools for CIFS/SMB/SMB2 Paul Long and Simon Sun Microsoft

OpenText Secure MFT Network and Firewall Requirements

DMZ Network Visibility with Wireshark June 15, 2010

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Intro to Firewalls. Summary

How to Configure Windows Firewall on a Single Computer

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Solution of Exercise Sheet 5

Using IPSec in Windows 2000 and XP, Part 2

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Nuclear Plant Information Security A Management Overview

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Introduction to Wireshark Network Analysis

Security Technology: Firewalls and VPNs

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012

Firewalls P+S Linux Router & Firewall 2013

inet Enterprise Features Fact Sheet

Events Forensic Tools for Microsoft Windows

Network Monitoring Comparison

WhatsUpGold. v3.0. WhatsConnected User Guide

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Interwise Connect. Working with Reverse Proxy Version 7.x

Network setup and troubleshooting

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Owner of the content within this article is Written by Marc Grote

Proxies. Chapter 4. Network & Security Gildas Avoine

EKT 332/4 COMPUTER NETWORK

Network Agent Quick Start

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

TCP Packet Tracing Part 1

Windows Server 2012 Hyper-V Extensible Switch and Cisco Nexus 1000V Series Switches

How To Install A New Database On A 2008 R2 System With A New Version Of Aql Server 2008 R 2 On A Windows Xp Server 2008 (Windows) R2 (Windows Xp) (Windows 8) (Powerpoint) (Mysql

Hands-On Microsoft Windows Server 2008

Server Software Installation Guide

Internet Security Firewalls

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts

12. Firewalls Content

Microsoft Lync Server 2010

Course Title: Penetration Testing: Security Analysis

Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1

How To Set Up Foglight Nms For A Proof Of Concept

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Covert Channel Analysis and Detection using Reverse Proxy Servers

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

WORKING WITH WINDOWS FIREWALL IN WINDOWS 7

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

BASIC ANALYSIS OF TCP/IP NETWORKS

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Ovation Security Center Data Sheet

Owner of the content within this article is Written by Marc Grote

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Configuring RemoteFX on Windows Server 2012 R2

User Guide. You will be presented with a login screen which will ask you for your username and password.

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Network Address Translation (NAT)

How To Understand and Configure Your Network for IntraVUE

File Sharing. Peter Lo. CP582 Peter Lo

Lecture 23: Firewalls

Microsoft Labs Online

Building A Secure Microsoft Exchange Continuity Appliance

Proxy Server, Network Address Translator, Firewall. Proxy Server

December P Xerox App Studio 3.0 Information Assurance Disclosure

Monitoring Nginx Server

Chapter 11 Cloud Application Development

Safeguard Your Remote Employees With CyBlock Hybrid

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Integrating LANGuardian with Active Directory

Lesson Plans Managing a Windows 2003 Network Infrastructure

Network Defense Tools

Securing and Accelerating Databases In Minutes using GreenSQL

VoIP Recorder V2 Setup Guide

CareGiver Remote Support Information Technology FAQ

11.1. Performance Monitoring

MCSA Security + Certification Program

Heterogeneous Environments. Paul Long/Microsoft

Laboratory Exercises VII: Network Firewalls

DeltaV System Health Monitoring Networking and Security

Overview. Firewall Security. Perimeter Security Devices. Routers

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

TEST AUTOMATION FRAMEWORK

PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008

Microsoft Lync 2010 Deployment Guide

Transcription:

Microsoft Message Analyzer Packet Analysis at a Higher Level Neil B Martin Test Manager WSSC- Interop and Tools Microsoft Corporation

Content Packet Analyzer - review Abstracting views of protocols Alternative data sources ETW Remote Capture Bluetooth USB Evtx Logs files Slide 2

Message Analyzer What is it? A packet analyzer is a computer program or a piece of computer hardware that can intercept and log traffic passing over all or part of a network Packet analyzers capture network packets in real time and display them in human-readable format Slide 3

WireShark, Microsoft NetMon 3.4 These tools are dissectors If they recognize a packet they dissect it and display the inner fields of the packet The parsers are written based on the protocol specifications or in some cases through reverse engineering of the protocols when no specification is available Slide 4

Slide 5

Dissection and Abstraction We want to allow a higher level of abstraction view of protcols Pattern Matching Match up request/response pairs where possible Called an operation Different Viewers and Charts Addressing many of the challenges of diagnosing modern networks Protocol Validation Identify packets that do not match the specification Data capture from multiple sources NDIS, Bluetooth, USB, Windows Firewall Layer, Web Proxy Header only network capture Reduce data in volume scenarios Correlation of data across multiple data sources and logs Load and display multiple data source Slide 6

Slide 7

Message Analyzer captures ETW ETW - Event Trace for Windows Message Capture from: Traditional NDIS traffic from the Network Adapter Windows Filtering Platform 9aka Firewall) Web proxy USB ports Bluetooth Windows SMB Client Windows SMB Server Slide 8

Slide 9

Event Tracing for Windows ETW High-resolution (<<100µs) logging infrastructure allows any component to tell the outside world what it is currently doing by firing ETW events. A powerful diagnostic tool to log every methods/lines inside the code with reasonable performance for debugging/troubleshooting. MSDN on ETW http://msdn2.microsoft.com/en-us/library/bb968803(vs.85).aspx Slide 10

All Windows ETW Sources are available to Message Analyzer Slide 11

Slide 12

Capability to perform remote capture Select machine and give credentials Collect data via ETW from NIC on remote machine Slide 13

Slide 14

Slide 15

Slide 16

Powerful, extensible viewing and analysis Browse, Select, View Browse for messages from various sources (live, or stored) Select a set of messages from those sources by characteristic(s) View messages in a provided viewer, configure or build your own A new high-level grid view High level Operations view with automatic re-assembly Bubbling up of errors in the stack to the top level Ability to drill down the stack to underlying messages and/or packets On the fly grouping, filtering, finding, or sorting by any message property Payload rendering Validation of message structures, behavior, and architecture Does the protocol comply with the specifications? Slide 17

Over 450 published specifications for Windows Protocols (as of Windows 8.1) (http://msdn.microsoft.com/en-us/library/gg685446.aspx) Available online and as PDF Continue to publish new documents with each release of Windows Continue to develop tools and technology to aid with the development of protocol documents, parsers and test technology Slide 18

How to get MA: http://www.microsoft.com/en-us/download/details.aspx?id=40308 How to get help: Blog, Operating Guide, Technet Forum for Message Analyzer We invite you to Explore Message Analyzer Connect Community https://connect.microsoft.com/site216/ Slide 19

20