Identify unnecessary system utilities, third-party tools, or potentially malicious software that may be used to delete files, and audit and/or block them by using whitelisting tools like AppLocker or Software Restriction Policies where appropriate.