Who's Doing What On My Network? PCWorld The second method involves locating your network core and using a deep packet inspection system to capture the file access activity from network traffic. This is probably the least disruptive way to get this data. Finally, you could also install ... See all stories on this topic »