Which of the following is the BEST method to use to prevent unauthorized devices from using the company’s wireless network?