Is your system a standalone system or is it administered by a central organization? The reason I am asking is because some of the detections that you are getting can be centrally administered.
For the following detection:
Code:
Windows Security Center.TaskManager: Settings (Registry change, nothing done)
HKEY_USERS\S-1-5-21-1757981266-1644491937-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr!=dword:0
Indicates that the policy setting for "System\DisableTaskMgr"is not a dword:00000000. A setting of dword:00000001 will disable Windows Task Manager .
Read:
The following detection:
Code:
Windows.Explorer: User settings (Registry change, nothing done)
HKEY_USERS\S-1-5-21-1757981266-1644491937-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun!=W=0
Indicates that the policy setting for "Explorer\NoRun" is not a dword:00000000. A setting of dword:00000001 will remove the Run menu from Start Menu.
The following detection:
Code:
Windows.Explorer: User settings (Registry change, nothing done)
HKEY_USERS\S-1-5-21-1757981266-1644491937-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoClose!=W=0
Indicates that the policy setting for "Explorer\NoClose" is not a dword:00000000. A setting of dword:00000001 will prevent access to the Shut Down command.
If your system is not centrally administered, I suggest you fix the detections. If your system is centrally administered, I suggest you ask your IT department if these policies were intentionally set by them.