- validate the configuration applied to the corporate Wi-Fi network and the chosen security method
- ensure that the guest network / captive portal does not allow access to the internal network
- confirm the implementation of robust policies on employee laptops regarding pairing to corporate Wi-Fi
- ensure that the captive portal is robust against network / web attacks
- check that the protections against Man-In-The-Middle attacks are applied and functional and do not allow a user account to be compromised
- check that the probes for detecting fraudulent access points are effective