We wanted this feature as well to make sure our users were logging in
from only company equipment. We used the same method you mentioned, host
checking set to look for specific files that would be on the trusted
computers.
You are leaving our website
You are leaving our site and we cannot be held responsible for the content of external websites