Threats and Exposures › Storage Modifications
The use of corezap utilities must be restricted. Look for evidence of use of these utilities.