A modern endpoint security plan encompasses device protection, threat resistance, identity protection, information protection, breach investigation, and response capabilities. While, in the past, many organizations invested in the best of breath security nowadays more organizations consider taking security from a single vendor. Given that Windows 10 is the most deployed operating system, the focus of this chapter will be on it. Utilizing its built-in capabilities will ensure a positive response for the questions in the previous section: