Concept Flow - Endpoint protection
Device connects to network
Endpoint protection software starts
Scan for threats
Threat found?
No→Allow normal use
Yes
Block or remove threat
Alert user or admin
Continue monitoring
This flow shows how endpoint protection software runs on a device, scans for threats, blocks or removes them, alerts users, and keeps monitoring.