The IDPS must monitor for unauthorized connections to the network through use of wireless IDS sensors. Wireless technologies include, for example, microwave, satellite, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP). In certain situations, wireless signals may radiate beyond the confines of organizationally controlled facilities. Organizations must proactively search for unauthorized wireless connections, including monitoring for unauthorized wireless access points. Monitoring must not be limited to those areas within facilities containing information systems, but must also include areas outside of facilities as needed, to verify that unauthorized wireless access points are not connected to the systems. Organizational response actions may include disabling unauthorized wireless connections. Monitoring may be accomplished on an ongoing basis or by periodic monitoring. |