Secure Your Endpoints: Detect Anomalies Effectively