How Endpoint Security System Works?