From 1c1dddd2b2200214f3b08596cd31f2295e47754d Mon Sep 17 00:00:00 2001
From: brutzman <brutzman@nps.edu>
Date: Sun, 22 May 2022 02:29:38 -0700
Subject: [PATCH] add step for launching

---
 documentation/Wireshark/README.md | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/documentation/Wireshark/README.md b/documentation/Wireshark/README.md
index 3cd36081ce..1b1eb7d708 100644
--- a/documentation/Wireshark/README.md
+++ b/documentation/Wireshark/README.md
@@ -21,15 +21,16 @@ IMPORTANT: if you have already installed Wireshark, check your version!
 Always use the latest version so that operating-system security and feature sets are up to date.
 
 1. Download Wireshark from https://www.wireshark.org
-2. Install as local administrator if possible
+2. Install Wireshark using local administrator permissions if possible.
 3. Launch and see if network packets are being detected.
 
 | Successful installation, monitoring network traffic | Failed installation, no monitoring of network traffic |
 | ------ | ------ |
 | <a href="images/WiresharkNetworkInterfaces.png"><img src="images/WiresharkNetworkInterfaces.png" width="400" align="center"/></a> | <a href="images/WiresharkNoNetworkTraffic.png"><img src="images/WiresharkNoNetworkTraffic.png" width="400" align="center"/></a> |
 
-4.  Check your network interfaces via console commands [ipconfig](ipconfig.txt)
-5.  Double-check network interfaces using [ipconfig /all](ipconfigAllExcerpt.txt) to see any hidden interfaces
+4. Check your network interfaces via console commands [ipconfig](ipconfig.txt).
+5. Double-check network interfaces using [ipconfig /all](ipconfigAllExcerpt.txt) to see any hidden interfaces.
+6. Select blue "fin" Wireshark button in  header bar to begin monitoring packets.
 
 
 ## Capturing Packets
@@ -45,8 +46,7 @@ Always use the latest version so that operating-system security and feature sets
 | <a href="images/WiresharkPreferencesCapture.png"><img src="images/WiresharkPreferencesCapture.png" width="400" align="center"/> | |
 
 2. Set filter to `(tcp.port == 3000 || udp.port == 3000) && dis`
-3. Press the blue Wireshark fin in the header bar to begin monitoring packets.
-4. Launch one of the example programs to send packets, then observe results.
+3. Launch one of the example programs to send packets, then observe results.
 
 | `udp && dis` | `(tcp.port == 3000 \|\| udp.port == 3000) && dis` |
 | ------ | ------ |
-- 
GitLab