Set NTFS Permissions the Right Way: Secure a Folder Without Breaking Inheritance
Difficulty: Intermediate |
Time Required: 15 minutes
NTFS permissions are one of Windows’ best security features—but they’re also one of the easiest ways to accidentally lock yourself out or create a messy “why can’t anyone access this?” situation. A common mistake is disabling inheritance on a folder (or copying random permissions) and then spending hours repairing access down the tree.
This tutorial shows a clean, reliable approach to securing a folder
while preserving inheritance where it helps you—so your permissions stay predictable, manageable, and recoverable. Steps apply to
Windows 10 (1909+) and Windows 11, with minor UI differences.
Prerequisites
Before you start, make sure you have:
- An administrator account on the PC
- A clear goal: Who should have access? Who should not?
- A folder to secure (ideally not a Windows system folder like
C:\Windows or C:\Program Files)
- (Recommended) A quick backup of anything important in the folder
Note: NTFS permissions apply only on NTFS-formatted drives. If the folder is on FAT32/exFAT, the Security tab won’t work the same way.
Step-by-Step: Secure a Folder Without Breaking Inheritance
Step 1) Choose the correct folder location
- Pick (or create) the folder you want to secure, e.g.:
D:\Private
C:\Users\<You>\Documents\Private
- Avoid applying custom NTFS permissions to:
C:\Windows
C:\Program Files
C:\ProgramData
- The root of the system drive (
C:\) unless you fully understand the consequences
Why: System folders have complex, OS-managed permissions. Custom changes can break updates, apps, or Windows itself.
Step 2) Open the Advanced Security settings
- Right-click the folder → Properties
- Open the Security tab
- Click Advanced
You’ll now see:
- Owner
- Inheritance status
- Permission entries (ACL)
Step 3) Confirm inheritance is enabled (and keep it enabled)
In the Advanced Security window:
- Look for “Inheritance: Enabled”
- If it says Disabled, click Enable inheritance
Warning: If inheritance is disabled, permissions become “unique” and harder to manage. This tutorial’s goal is to avoid that unless there’s a very specific reason.
Step 4) Add the user/group you want to allow (without removing inherited entries)
Instead of stripping the ACL, we’ll
add explicit permissions for the folder while leaving inherited ones intact.
- Click Add
- Click Select a principal
- Type the account name (examples):
- Your username:
YourPC\YourName
- A local group:
Users
- A Microsoft account user might appear as the local profile name
- Click Check Names → OK
- Under Basic permissions, choose one:
- Modify (recommended for personal folders)
- Read & execute (if you want read-only access)
- Full control (use sparingly)
- Under Applies to, keep:
- This folder, subfolders and files (typical)
- Click OK
Tip: Prefer assigning permissions to a group (like a custom group or “Users”) instead of many individual accounts. It scales better.
Step 5) Reduce access for “Users” (without breaking inheritance)
Here’s the key idea:
don’t disable inheritance. Instead, add a targeted rule that reduces access
where needed.
If you want only your account (and admins/SYSTEM) to access the folder:
- In Advanced Security, review entries like:
SYSTEM
Administrators
- Your user account
Users or Authenticated Users
- If
Users or Authenticated Users has permissions you don’t want:
- Select that entry → Edit (or double-click it)
- Change permissions to Read & execute (or remove write access)
- Ensure Applies to covers the correct scope (usually “This folder, subfolders and files”)
Important: In many environments, Users or Authenticated Users is inherited from a parent folder. Editing or removing an inherited entry might not be allowed unless you change the parent or disable inheritance.
Better approach: If this folder is inside your user profile (C:\Users\<You>\...), it often already has safe defaults. If it’s on a shared data drive, consider making a dedicated parent folder with correct inheritance (see Step 6).
Step 6) (Best practice) Create a “secure parent folder” and inherit downward
This is the cleanest long-term strategy: set permissions on a
parent folder and let everything underneath inherit.
- Create a parent folder, e.g.
D:\Data_Secure
- Move your target folder inside it, e.g.
D:\Data_Secure\Private
- Apply your desired permissions to
D:\Data_Secure:
- Keep inheritance enabled on
D:\Data_Secure (from D:\)
- Add explicit permissions for your chosen users/groups
- Avoid unique permissions on many subfolders
Why this works: You avoid per-folder “special cases.” Inheritance becomes your friend instead of the thing you fight.
Step 7) Use “effective access” to verify your results
Windows can show what access a user
actually has after all inheritance and groups are considered.
- In Advanced Security, click Effective Access
- Click Select a user
- Enter the account you’re testing (for example, a standard user)
- Click View effective access
Confirm:
- Expected users have Modify/Read as intended
- Unwanted users show “No access” or limited permissions
Tip: This is the fastest way to catch surprises from group membership (like someone being in “Administrators” or another allowed group).
Step 8) Test in real life (recommended)
Permissions can look correct but still behave unexpectedly due to cached tokens or running apps.
- Sign out and sign back in (or reboot)
- Test access using:
- A different local user account, or
- “Run as different user” (where applicable)
- Try:
- Opening files
- Creating a new file
- Deleting a file
Tips, Warnings, and Troubleshooting
Tip: Prefer “Modify” over “Full control”
- Modify is usually enough for day-to-day work.
- Full control includes permission-changing rights, which can increase risk if malware runs under that account.
Warning: Don’t remove SYSTEM or Administrators
You’ll commonly see:
SYSTEM (Windows services and OS components)
Administrators (local admin group)
Removing them can cause:
- Backup failures
- App issues
- Inability to recover access later
If you locked yourself out
If you can’t open the folder anymore:
- Right-click folder → Properties → Security → Advanced
- Next to Owner, click Change
- Set owner to your account or Administrators
- Check Replace owner on subcontainers and objects (if needed)
- Apply changes
- Then add back permissions for your account
Note: Ownership lets you change permissions, but it doesn’t automatically grant access until you add an allow entry.
“Deny” permissions: use only when necessary
“Deny” is powerful and can override allows. Use it only when:
- You must block a specific account that otherwise gains access via a group
Otherwise, it’s cleaner to:
- Remove/limit allow permissions instead of adding denies
Sharing vs NTFS permissions (common confusion)
- Sharing permissions apply over the network (SMB shares)
- NTFS permissions apply locally and over the network
- The most restrictive combination wins
If users can access locally but not over the network (or vice versa), check the folder’s
Sharing settings too.
Conclusion
Securing a folder with NTFS doesn’t have to mean “disable inheritance and hope for the best.” The safest approach is to
keep inheritance enabled, add
specific allow permissions for the users who need access, and rely on a well-designed
parent folder so the rules flow cleanly to everything inside. Verifying with
Effective Access helps ensure the result matches reality.
Key Takeaways:
- Keep inheritance enabled whenever possible to avoid messy, one-off permission trees.
- Use a secure parent folder and let permissions inherit downward for clean management.
- Prefer Modify over Full control and avoid removing SYSTEM/Administrators.
- Always verify with Effective Access and real-world testing (sign out/in).
This tutorial was generated to help WindowsForum.com users get the most out of their Windows experience.