Incorporates sophisticated, customizable compression routines
Keeps a log of file system activity to facilitate recovery if a system crash occurs
Required for encryption and advanced access security for files, user accounts, and processes
Improves fault tolerance through RAID and system file redundancy