I don't believe I have the answers for you, but I will make a few comments that might help you understand some of this a little better. First off, there are different types of APs that a can show up. Of course you have your own APs which are running your network. A rogue AP is officially an AP that is plugged into your network, but you do not manage it or support it (somebody else plugged it in). An interfering AP is another other AP the your network hears, and is not plugged into your network; so neighbor APs, or personal phones or hotspots are all interfering. You can't do anything with interfering AP, they have as much right to use the RF and advertise their networks as you have to advertise your networks.
In most countries around the world, it is illegal to generate wireless signals to disconnect somebody from a network or to jam or interfere with RF signals. Therefore, containment methods such as deauthentication or tarpitting are most likely illegal. Wired containment methods are legal since they do not violate RF regulations.
Looking at your items, I'm interpreting them (and I may be wrong) that item 1 is looking for discovery and reporting of information about any rogues that are found. Item 2 appears to be requesting documentation that you located the rogue and physically removed it from the network. At least that is how I am reading those requests.