Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

PacketMotion PacketSentry 2.0.3: Page 3 of 4

Enterprises looking to limit usage of IM and peer-to-peer applications will appreciate the wealth of supported protocols. I tested AIM, BitTorrent and eDonkey with perfect detection. PacketSentry even gathers metadata that shows what files were being downloaded, and the user names for IM and with whom conversations were initiated.

PacketSentry also will detect port scans and worm activity. I tested this by running a couple of different network scans using nmap. Each scan was picked up, labeled as port scan or worm and mapped back to the user who was logged in at the time.

Network activity generated by hosts on the network that aren't logged into Active Directory show up as unclassified. The applications and protocols are logged with the source and destination IP addresses but dn't have an associated user.

User Reports

Reporting functions were basic but thorough. I selected a date range, the type of application of interest and whether I wanted the results based on user names or hosts. The result provided an easy to read graph and table listing. The data can be exported to a comma-separated value file to be imported into your favorite spreadsheet application for manipulation.