Monitor and patrol assigned areas to detect signs of unauthorized access, suspicious activities, or security breaches. Use surveillance equipment, such as cameras and monitors, to maintain a vigilant watch Control and monitor access points, ensuring that only authorized individuals enter secured areas. Verify identification and credentials of employees, visitors, and other individuals.