Windows Resource Monitor
Overview
If your Windows Server feels slow, unresponsive, or is experiencing performance issues, the Windows Resource Monitor (Resmon) is the best built-in tool to diagnose the problem. It gives you a live, detailed look at how your server is using its CPU, memory, disk, and network resources.
This guide will show you how to use the Resource Monitor to:
- Find out which applications are slowing down your server.
- Identify processes causing high disk or network activity.
- Check for memory leaks in your applications.
- Pinpoint the root cause of performance bottlenecks.
Accessing Windows Resource Monitor
The Windows Resource Monitor can be run by following either of these methods:
- Type resmon in the Windows search bar and press Enter.
- Run resmon.exe from the Run dialog (Win + R).
- Access via Task Manager → Performance tab → Open Resource Monitor.
Parameters / Features
| Tab | Description |
|---|---|
| Overview | Displays CPU, Disk, Network, and Memory usage summaries. |
| CPU | Shows process-level CPU usage, threads, and handles. Identifies processes causing high CPU load. |
| Memory | Displays physical and virtual memory usage by each process. Helps locate memory leaks. |
| Disk (Storage) | Monitors read/write operations and disk response times for each process. |
| Network | Shows per-process network activity, including TCP connections and bandwidth usage. |
Examples
Identify High CPU Usage Process
- Open Resource Monitor (resmon.exe).
- Go to CPU tab → Processes.
- Click the CPU column header to sort by usage.
- Identify the process using the most CPU resources.
Analyze Memory Usage
- Open the Memory tab.
- Check the Commit (KB) and Working Set (KB) columns to identify processes consuming large memory portions.
- Hover over the Physical Memory bar graph to see how much memory is in use, modified, standby, or free.
- Identify if any process shows High Hard Faults/sec, which could indicate excessive paging.
More information about Windows RAM found here.
Monitor Disk Activity
- Open the Disk tab.
- Sort by Total (B/sec) to view processes performing heavy read/write operations.
- Expand Disk Activity to view specific files being accessed.
Monitor Network Activity
- Go to the Network tab.
- Sort by Send (B/sec) or Receive (B/sec) to find processes using the most bandwidth.
- Expand TCP Connections to view local and remote addresses, ports, and latency.
- Identify unknown processes with persistent or suspicious connections.
Common Use Cases
- Diagnosing system slowdowns due to high CPU or memory usage.
- Identifying applications causing disk thrashing or I/O delays.
- Monitoring network connections to detect unusual traffic or potential malware activity.
- Checking memory leaks in applications or services.
- Verifying that processes release the system handles correctly.
Troubleshooting & FAQs
Next Steps
Once you’ve used the Resource Monitor to identify a problem, here are some common next steps:
- If a specific application has high CPU or memory use: Try restarting the application or service. If the problem persists, check the logs for more information. You may have an update from the software vendor or you may need to review its configuration settings.
- If your server consistently has high memory usage and hard faults: Your server may not have enough RAM for its workload. Consider upgrading your server to a plan with more memory.
- If you see suspicious network activity: If you’ve identified a process with unknown or suspicious network connections, you should run a security scan and ensure your firewall is properly configured.
- If you’re unsure how to resolve an issue: After identifying the problematic process or resource, you can contact our Support team with your specific findings. Providing the name of the process and the data you observed will help us assist you more quickly. 1
Helpful Links and Articles
1 Service provided ‘as is’ without any warranties or guarantees, express or implied. Please be aware that while we investigate all reported issues, a resolution isn’t always possible.. If the problem is downstream, we will engage our vendors.