Identify all of the devices that are being connected to your LAN network.
Scan your local network to manage available resources and vulnerabilities.
Find and list the MAC addresses of remote computers in your network.