During an audit, your company's security policies regarding endpoint protection are under review. While examining the current solutions, you note that the recently deployed security system on critical endpoints is not relying solely on signature-based detection to mitigate attacks. Considering its capabilities, which feature of this system aligns with those of a robust HIPS to enhance the security of these endpoints?
Performing retrospective log analysis to identify the source and method of a data breach
Behavioral monitoring to analyze and block activities that may signify malicious intent
Applying system hardening techniques to reduce the attack surface of the endpoints
Updating its database of virus definitions frequently to catch the latest known malware