Ensuring Endpoint Configuration Security_When Security Assets Become Liabilities