A Comprehensive Guide to Endpoint Security Best Practices