On Mon, 15 Oct 2012 13:11:00 +1100, Karl Auer said:
No-one has said this yet, so I will - why are people working around your normal network policies? This is often a sign of something lacking that people need in their daily work. You can often reduce this sort of "innocent thievery" down to a manageable minimum simply by making sure that people have the tools they need to work.
Sometimes it's cheaper to give people what they want than to prevent them taking it. Maybe at least consider that as an option.
Amen to that - detecting rogue access points is one thing, but in order to make the users stop doing it, you're going to need either a sufficiently large carrot or a sufficiently large stick. If you don't deploy at least one, the problem *will* keep recurring.