Rogues Dashboard report helps identify and track wireless devices unknown to the network. This dashboard helps you to report on and reduce risk of unsecured wireless networks, MAC spoofing of wireless clients, and wireless Man-in-the-Middle attacks facilitated by rogue access points.
You can sort displayed devices by any column (SSID, MAC address, time noticed, and so on), search for a specific device, exclude known devices, and track any known devices in RF signal range to your wireless network.
Choose Device. Choose one or more host devices you want Rogues Dashboard information for.
Choose time constraints. Choose times for the Rogues Dashboard. (For recently observed measurements, select Last Polled from the Date Range drop down list.)
Filter and reduce by row and by column. Sort and remove columns, group rows based on specific column values, and hide records with the Exclude Rogue button.
Rename Report. Edit report name using the Report Settings dialog.
Note: This report only returns Rogues Dashboard metrics for devices that already have the appropriate WMI or SNMP credentials. For more information, see Using Credentials.
Note: If Current is selected as the reporting interval, the Rogues page only displays the SSID and MAC Address of rogues currently visible.
The devices displayed on the Rogues Dashboard page are grouped by the access points on which they are/were connected. An SSID/MAC Address combination may appear under more than one access point indicating it is a roaming device hopping from one access point to another. Clicking the icon to the left of any access point displayed launches a dialog containing detailed AP information. Specific dialog content is identical to detailed device information displayed when you click on an access point icon on the My Network Map.
Most generated Rogues Dashboard report data can be printed, shared, and exported when selecting Expand () from the Dashboard Options () menu. After the report has been expanded, select export () to access the following options: