Configuring the endpoint protection infrastructure