A common troubleshooting step is collecting a packet capture to see what's happening at the network level. Perhaps you're trying to track down a port blocked by a firewall or a connection that just isn't working right. For this, many people would install Wireshark, Microsoft Network Monitoring (netmon), or Microsoft Message Analyzer. However, Server 2008 R2 and newer includes the ability to collect packet captures using the native netsh tool without any additional installations. With many environments under strict change control, this is a quick and easy way to get what you need. Here, we'll cover the process for collecting and analyzing a packet capture with netsh.
by Mitchell Grande