Describe how JEA endpoints work to limit access to a PowerShell session

Completed