Identify unauthorised change to perimeter defenses ()