We configured endpoint detection tools (ie Very Popular Endpoint Product) to scan local networks for these devices based on open ports and mac addresses. It is fairly straightforward to fingerprint them. Not foolproof (wifi isolation and other network segmentation), but low hanging fruit.