
If you are running the FAT file system, which is not a secured file system, you should consider converting to the NTFS file system.
Secured file systems, such as NTFS, are a key component of security, because they restrict user access to data. By using file system security, you can specify which users are allowed to access individual files and what type of access they are allowed (for example, read or modify). NTFS protects your data by preventing unwanted user access to it.
Note
You need to manually secure your files by using access control lists (ACLs). To do this, right-click the file or folder to which you want to control, click Properties, click the Security tab, and then specify the appropriate access restrictions for the file.
Solution
Convert your system from FAT to NTFS. For more information, view the documentation below on using NTFS and how to convert drives to NTFS.
Additional Information
Choosing between NTFS, FAT, and FAT32
How to Restore the Default NTFS Permissions for Windows 2000 EL TEMA ES QUE YO TENGO XP NO ENTIENDO!!


Check Description
This check determines whether the system has a software update installed that required a system restart that has not yet taken place. This is flagged in the scan report as a potential vulnerability, because if the update was for security purposes, it may not be providing needed protection until the restart has completed.
We recommend that you restart the computer immediately following the installation of security updates, both for protection and stability of the system.
Issue
A result marked with a potential risk score confirms that a previous software update installation was not completed. You must restart the computer to finish the installation. If the incomplete installation was a security update, the computer may be at risk until the computer is restarted.
Solution
We recommend that you restart the computer as soon as possible and scan the computer again for security updates. If the score provided by this check is a blue asterisk (best practice), the notes provided by this check should also be reviewed to understand the limitations of some updates.
Notes
This check takes advantage of an improvement added to Update.exe, the standard update installer for Windows products. This installer and the improvement used by this check are described in Microsoft Knowledgebase article 832475. The check is able to accurately identify when an update is in an incomplete state if it was packaged with version 6.1.22.0 of the installer. However, it is not able to provide this indication for older updates which may be present and in this state.
To determine the version of Update.exe, extract the contents from the shipping package using the procedures in Microsoft Knowledgebase article 832475. Once extracted, use the tables in the Extracted package directory structure to find Update.exe. View the version number by right-clicking Update.exe and then clicking Properties. In the Update.exe Properties dialog box, click the Version tab.
Updates packaged using the Windows Installer are also not evaluated by this check. The registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\PendingFileRenameOperations can sometimes be used to determine whether a restart is required. If this key exists and has files listed within it, a restart is pending. ACA TAMPOCO ENTIENDO!! YA LA RESTAURE MIL VECES

This check determines whether auditing is enabled on the scanned computer. Microsoft® Windows® has an auditing feature that tracks and logs specific events on your system, such as successful and failed logon attempts. By monitoring your system's event log, you can help identify potential security issues and malicious activity.
Additional Resources
Chapter 3 - Audit Policy (Threats and Countermeasures Guide)
Chapter 9 - Auditing and Intrusion Detection (Securing Windows 2000 Server)
Windows Server 2003: Auditing Security Events Best Practices
ME METI AHI MIRE TODO LEI TODO PERO TAMPOCO SE COMO SOLUCIONARLO
Unnecessary ServicesCheck Description
This check determines whether any services contained in the Services.txt file are installed on the scanned computer and lists the files with their current state (enabled or disabled). The Services.txt file is a configurable list of services to be checked on the scanned computers. The Services.txt file, installed by default with the tool, contains the following services:
MSFTPSVC (FTP)
TlntSvr (Telnet)
W3SVC (WWW)
SMTPSVC (SMTP)
In Microsoft® Windows® XP, and Windows 2000, a service is a program that runs in the background whenever the computer is running the operating system. It does not require a user to be logged on. Services are needed to perform user-independent tasks, such as a fax service that waits for incoming faxes.
Y BUE ESTE ES EL ULTIMO ,LA VERDAD QUE YA NO SE QUE MAS HACER ENCIMA EL CPU ME HACE UN RUIDO DADO EN EL ARRANQUE MIL PERDONES POR LO EXTENSO DE TODOS MIS PROBLEMAS Y BUENO SI HAY ALGUIEN CON UN POQUITO DE VOLUNTAD QUE ME PUEDA AYUDAR DESDE YA LE ESTOY SUPER AGRADECIDA!!
