# Guides

- [How to enable network and runtime monitoring (Harden-Runner) for runners](/guides/how-to-enable-network-and-runtime-monitoring-harden-runner-for-runners.md)
- [How to restrict network connections to explicitly allowed endpoints](/guides/how-to-restrict-network-connections-to-explicitly-allowed-endpoints.md)
- [How do I authenticate with the StepSecurity app](/guides/how-do-i-authenticate-with-the-stepsecurity-app.md)
- [How should I improve the security of third-party actions in my organization](/guides/how-should-i-improve-the-security-of-third-party-actions-in-my-organization.md)
- [How should I reduce the number of Harden-Runner anomalous endpoint alerts](/guides/how-should-i-reduce-the-number-of-harden-runner-anomalous-endpoint-alerts.md)
- [How can developers see and fix StepSecurity findings without security’s help?](/guides/how-can-developers-see-and-fix-stepsecurity-findings-without-securitys-help.md)
- [How to Respond to a Compromised npm Package in Your Organization](/guides/how-to-respond-to-a-compromised-npm-package-in-your-organization.md)
- [How to Fix a Blocked Endpoint in Your Workflow](/guides/how-to-fix-a-blocked-endpoint-in-your-workflow.md)
