A local computing endpoint (e.g., a desktop computer, a notebook computer) is used to detect the presence of and record information about one or more wireless access point within range of the local computing endpoint. The recorded information is processed by a centralized computing endpoint to determine whether any of the one or more wireless access points is a rogue wireless access point.