Identify potentially malicious software that may be used to access logical drives in this manner, and audit and/or block it by using whitelisting tools, like AppLocker, or Software Restriction Policies where appropriate.