In addition, it peers deeper and tries to find other information, such as whether the device is a workstation, printer, server, router or PC, as well as the manufacturer and model number.Compare what the program finds with the list of devices that you know are safe and secure.