How to Run Microsoft Teams Network Testing Companion

You’ll find no shortage of content surrounding Microsoft Teams on blogs, forums and social media these days. But, did you ever do a search for how to run Microsoft Teams Network Testing Companion? If you have, you’ll notice the barren wasteland of info regarding the topic. There seems to be a real lack of resources for step-by-step instructions on how to run Microsoft Teams Network Testing Companion so we want to dive into that topic this week. Here’s hoping this makes your life that much easier. Let’s start.

To begin, run PowerShell as an Administrator.

In PowerShell, run the following commands in order:

  • Set-ExecutionPolicy RemoteSigned
  • Install-Module -Name NetworkTestingCompanion
  • Invoke-ToolCreateShortcuts

Find the Network Testing Companion icon on your desktop or in the Windows Start Menu:

If you see an install button, click it, otherwise skip this step:

Click on the Settings tab and adjust the number of consecutive tests to run (1-50). The more you run, the more data you will receive:

Click on the Start Tests tab and then click the Start button:

If you see a Firewall popup, you will need to allow access:

You should then see indication that the tests are running:

When the tests are complete, click the View Results tab:

Click on the Report icons to view more detail:

That’s it! We hope this fills the Internet void concerning this topic. If you have additional questions, or if you got stuck anywhere along the way, Contact Us through email. We’ll get an expert on the line as soon as possible and they can get you the answers you need!

Share:

Facebook
Twitter
LinkedIn
Picture of Arslan Ahmad

Arslan Ahmad

A passionate content writer armed with years of experience in the tech industry striving to be your go-to source for cutting-edge insights and knowledge related to IT.

Contact Us

=
On Key

More Posts

WME Cybersecurity Briefings No. 024
Cyber Security

WME Security Briefing 28 August 2024

GhostWrite Vulnerability in T-Head CPUs Exposes Devices to Unrestricted Access Overview A critical architectural flaw in T-Head’s XuanTie C910 and C920 RISC-V CPUs was uncovered by recent research from the CISPA Helmholtz Center for Information Security. Dubbed GhostWrite, the vulnerability

Click Here to Read Full Article »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.

=