What Is Endpoint Hardening? A Practical Guide for Non-Security Teams