This document discusses SQL Server endpoints and security. It describes how endpoints control connections to SQL Server instances and define acceptable communication methods. Endpoints have transports like TCP and payloads that determine allowed traffic types. Access to endpoints can be controlled through permissions. Various endpoint types like for database mirroring have additional configuration options. The document also covers creating principals like logins and users, roles, and configuring the SQL server surface area to restrict features and harden security.