How to use Application and Device Control to limit the spread of a threat.