Using Endpoint Protection's Network Activity Tool to Identify Suspicious Processes