An unauthorised, rogue access point can compromise the security of a wireless network by exposing the company’s network to the outside world. To avoid this, the network manager must first detect the presence of a rogue AP on his network and then locate it