Endpoint Security: Creating Keys