Malware scan and protection
Anti-exploit protection (IoA)
Endpoint activity process monitroing and recording
Basic application control
Endpoint IoC search and containment
Forensic data collection
Endpoint Detection and Response (EDR)