Actually it’s really bad practice to hide your SSID and can actually make your network less rather than more secure.
For example see the following:
www.howtogeek.com/howto/28653/debunking-myths-is-hiding-your-wireless-ssid-really-more-secure
That said, I expect many networks are (incorrectly) set with a hidden SSID so it’s perhaps reasonable to expect Poly to be able to handle them.
That information is really designed for consumer APs where people mistakenly think that a hidden SSID ALONE is the only security required.
----
IT security for me is about layering multiple security features and multiple firewalls. Hidden SSIDs is just one of them.
So my setup is different. I have three layers of firewalls (two of which provide wireless AP capabilities), each from a different enterprise security manufacturer, combined with two 24/7 packet sniffers looking at what's going into and out of my ingress egress points (perimeter).
Partly because I work in the IT industry, and partly because I've been hacked multiple times (e.g. bot-port scanners are still happening to me today, every day), and partly because I'm a gadget geek who likes to see what's happening on my network.
- Secure L2 firewall between my wireless and wired networks (two different subnets, blocked between)
- Mac Address white listing (I was happy Chord's AP portal included the network MAC add right in the web page)
- Protocol monitoring (e.g. only approved protocols allowed, even when my computer makes a request)
- IDS/IPS with Deep packet inspection for all HTTPS traffic. Which, these days, is 90% of my web traffic
- Domain blacklisting
- RIA port forwarding and IPSec vpn only for remote access (Sonicwall and Fortinet come with free licenses). SSL VPN turned off.
- blocked access to management port
Of course, I use most of the other basic UTM features too. Nothing too fancy, just turning on the common ones like IP reputation, DLP, antimalware, port level antivirus and antispam. Mostly just standard East-West level security. I also setup a teeny tiny simple AD within the network for server services to my NAS server, mostly consumer grade stuff, but every layer of security counts.
I try to do security at on the server side, and switch side as well. With both a Cisco SMB200 and a Consentry 4048 (Consentry went out of business, but their switch was top notch, just weak on sales). Also an inline PAN200.
These are just a few of my security practices.
There are more, but the ones above are the most common ones.