Overview
In our Using Air Marshal to Secure Your Network module, you'll learn to monitor, analyze, and contain rogue wireless access points across your enterprise environment.
You'll be able to
-
Evaluate the wireless intrusion prevention system (WIPS) capabilities of Meraki access points
-
Implement SSID Block lists, Allow lists, and alerting as proactive security mechanisms
-
Resolve compromised networks through active containment of malicious SSIDs
Start module for free