Understanding Endpoint Security Management and Monitoring