Implementation Actions Deploy endpoint protections.Restrict script/macro abuse.Tune malware response playbooks.