How Endpoint Protection uses encryption and certificates