Understanding Endpoint Security: A Comprehensive Guide