Identify and block potentially malicious software that may be executed through run key or startup folder persistence using whitelisting tools like AppLocker or Software Restriction Policies where appropriate.