List The Steps For Securing An Endpoint