1. Windows
    1. Features available to NTFS that are not available to FAT:
      1. FAT:
        1. File Allocation Table. A family of industry-standard file systems. The FAT file system is useful today in lightweight systems, but cannot deliver the performance of modern file systems.
        2. For compatibility, FAT is supported by nearly all PC, mobile, and embedded operating systems. Because of this, FAT is well-suited for data exchange between devices of almost any type and age from 1981 to the present.
      2. NTFS:
        1. New Technology File System. A proprietary file system developed by Microsoft. Starting with Windows NT 3.1, NTFS is the default file system of the Windows NT family.
        2. NTFS has several technical improvements over the file system it replaced (File Allocation Table [FAT]):
          1. NTFS is more secure
          2. NTFS enables system logging
          3. NTFS supports file encryption
          4. NTFS supports larger maximum partition and file sizes
        3. However, one consideration is that FAT is backward compatible with virtually all devices, while NTFS is not.
    2. Options available when using the convert command:
      1. Converts a FAT volume to NTFS.
        1. volume
          1. Specifies the drive letter (followed by a colon), mount point, or volume name.
        2. /FS:NTFS
          1. Specifies that the volume will be converted to NTFS.
        3. /V
          1. Specifies that Convert will be run in verbose mode.
        4. /CvtArea:filename
          1. Specifies a contiguous file in the root directory that will be the place holder for NTFS system files.
        5. /NoSecurity
          1. Specifies that the security settings on the converted files and directories allow access by all users.
        6. /X
          1. Forces the volume to dismount first if necessary. All open handles to the volume will not be valid.
    3. Verify the file system being used in a Windows environment:
      1. chkdsk
    4. Verify hidden system files and folders:
      1. By default, system files and folders are hidden from view in Windows OS.
      2. Configure Windows OS to permanently show hidden files and folders with the following actions:
        1. Navigate to the file explorer Options dialog box
        2. Select the View tab
        3. Under Hidden Files and Folders, check the box that says Don't Show Hidden Files, Folders, or Drives.
          1. While in the View tab, the box directly under the Hidden Files and Folders box, the Hide Protected Operating System Files (Recommended) box should also be checked. This hides files such as bootmgr and pagefile.sys
  2. Linux
    1. Generally, the best file system for Linux is ext4.
    2. To verify the file system being used in a Linux environment, issue either of the following commands in the shell:
      1. fdisk -l
      2. df -T
  3. Strategies to harden and maintain a hard drive:
    1. Remove Temporary Files:
      1. These files use hard disk memory, decrease performance, and threaten security. The organization's security policy should include the periodic use of Disk Cleanup for all devices.
    2. Periodically Check System Files:
      1. A File Integrity Check can be performed In Windows using the chkdsk command, which examines the disk and provides a report. It can also fix some errors with the /F option. The SFC (System File Checker) utility checks and (if necessary) replaces protected system files in the OS and other applications.
      2. A File Integrity Check can be performed in Linux using fsck to check and repair a Linux file system. The syntax for fsck is:
        1. fsck [ -sAVRTNP ] [ -C [ fd ] ] [ -t fstype ] [filesys ... ] [--] [ fs-specific-options ]
      3. Open Source Data Integrity Tools (such as Tripwire) can also be downloaded for Linux.
    3. Defragment Drives:
      1. Defragmenting the drive can be done with Microsoft's Disk Defragmenter, with the command-line defrag command, or with third-party programs.
    4. Back Up Data:
      1. Microsoft Active Directory databases are particularly susceptible to attack. Because of this, the System State for these operating systems should be backed up.
    5. Use Restoration Techniques:
      1. macOS and OS X use the Time Machine utility to create restore points.
      2. Restore points do not exist in Linux. Linux users should back up their ~/home directory. When this directory is decompressed to a new install, most of the Linux system and settings will be restored.
      3. Windows servers and workstations should regularly have restore points created, using rstrui.exe. Restore points are also created automatically by the OS before new applications, service packs, or hardware are installed.
    6. Consider Full Disk Encryption:
      1. This makes it more difficult for attackers to interpret the contents of a disk, if it is obtained.