Properly configure firewalls, application firewalls, and proxies to limit outgoing traffic to sites and services used by remote access tools.