How Does Endpoint Protection Work