Controls and detection for endpoint attacks¶ Controls and detection: Reducing endpoint attack surface Detecting endpoint attacks