These are tools or utilities that allow direct modification of data files outside the normal application interface — such as database editors or command-line tools. Because they bypass application controls, their use must be strictly controlled, logged, and reviewed by management.
Source: MSO_AUDIT Para 3.22.70