FIG. 4 illustrates an embodiment of the present disclosure wherein multiple information sources may be used to examine devices present on the network to determine whether the device is legitimate or rogue, determine if the device conforms to standards that have been devised to ensure network security and/or to determine the physical location of the device.