Set NTFS Permissions the Right Way: Secure a Folder Without Breaking Inheritance

  • Thread Author

Set NTFS Permissions the Right Way: Secure a Folder Without Breaking Inheritance​

Difficulty: Intermediate | Time Required: 15 minutes
NTFS permissions are one of Windows’ best security features—but they’re also one of the easiest ways to accidentally lock yourself out or create a messy “why can’t anyone access this?” situation. A common mistake is disabling inheritance on a folder (or copying random permissions) and then spending hours repairing access down the tree.
This tutorial shows a clean, reliable approach to securing a folder while preserving inheritance where it helps you—so your permissions stay predictable, manageable, and recoverable. Steps apply to Windows 10 (1909+) and Windows 11, with minor UI differences.

Prerequisites​

Before you start, make sure you have:
  • An administrator account on the PC
  • A clear goal: Who should have access? Who should not?
  • A folder to secure (ideally not a Windows system folder like C:\Windows or C:\Program Files)
  • (Recommended) A quick backup of anything important in the folder
Note: NTFS permissions apply only on NTFS-formatted drives. If the folder is on FAT32/exFAT, the Security tab won’t work the same way.

Step-by-Step: Secure a Folder Without Breaking Inheritance​

Step 1) Choose the correct folder location​

  1. Pick (or create) the folder you want to secure, e.g.:
    • D:\Private
    • C:\Users\<You>\Documents\Private
  2. Avoid applying custom NTFS permissions to:
    • C:\Windows
    • C:\Program Files
    • C:\ProgramData
    • The root of the system drive (C:\) unless you fully understand the consequences
Why: System folders have complex, OS-managed permissions. Custom changes can break updates, apps, or Windows itself.

Step 2) Open the Advanced Security settings​

  1. Right-click the folder → Properties
  2. Open the Security tab
  3. Click Advanced
You’ll now see:
  • Owner
  • Inheritance status
  • Permission entries (ACL)

Step 3) Confirm inheritance is enabled (and keep it enabled)​

In the Advanced Security window:
  1. Look for “Inheritance: Enabled”
  2. If it says Disabled, click Enable inheritance
Warning: If inheritance is disabled, permissions become “unique” and harder to manage. This tutorial’s goal is to avoid that unless there’s a very specific reason.

Step 4) Add the user/group you want to allow (without removing inherited entries)​

Instead of stripping the ACL, we’ll add explicit permissions for the folder while leaving inherited ones intact.
  1. Click Add
  2. Click Select a principal
  3. Type the account name (examples):
    • Your username: YourPC\YourName
    • A local group: Users
    • A Microsoft account user might appear as the local profile name
  4. Click Check NamesOK
  5. Under Basic permissions, choose one:
    • Modify (recommended for personal folders)
    • Read & execute (if you want read-only access)
    • Full control (use sparingly)
  6. Under Applies to, keep:
    • This folder, subfolders and files (typical)
  7. Click OK
Tip: Prefer assigning permissions to a group (like a custom group or “Users”) instead of many individual accounts. It scales better.

Step 5) Reduce access for “Users” (without breaking inheritance)​

Here’s the key idea: don’t disable inheritance. Instead, add a targeted rule that reduces access where needed.
If you want only your account (and admins/SYSTEM) to access the folder:
  1. In Advanced Security, review entries like:
    • SYSTEM
    • Administrators
    • Your user account
    • Users or Authenticated Users
  2. If Users or Authenticated Users has permissions you don’t want:
    • Select that entry → Edit (or double-click it)
    • Change permissions to Read & execute (or remove write access)
    • Ensure Applies to covers the correct scope (usually “This folder, subfolders and files”)
Important: In many environments, Users or Authenticated Users is inherited from a parent folder. Editing or removing an inherited entry might not be allowed unless you change the parent or disable inheritance.
Better approach: If this folder is inside your user profile (C:\Users\<You>\...), it often already has safe defaults. If it’s on a shared data drive, consider making a dedicated parent folder with correct inheritance (see Step 6).

Step 6) (Best practice) Create a “secure parent folder” and inherit downward​

This is the cleanest long-term strategy: set permissions on a parent folder and let everything underneath inherit.
  1. Create a parent folder, e.g. D:\Data_Secure
  2. Move your target folder inside it, e.g. D:\Data_Secure\Private
  3. Apply your desired permissions to D:\Data_Secure:
    • Keep inheritance enabled on D:\Data_Secure (from D:\)
    • Add explicit permissions for your chosen users/groups
    • Avoid unique permissions on many subfolders
Why this works: You avoid per-folder “special cases.” Inheritance becomes your friend instead of the thing you fight.

Step 7) Use “effective access” to verify your results​

Windows can show what access a user actually has after all inheritance and groups are considered.
  1. In Advanced Security, click Effective Access
  2. Click Select a user
  3. Enter the account you’re testing (for example, a standard user)
  4. Click View effective access
Confirm:
  • Expected users have Modify/Read as intended
  • Unwanted users show “No access” or limited permissions
Tip: This is the fastest way to catch surprises from group membership (like someone being in “Administrators” or another allowed group).

Step 8) Test in real life (recommended)​

Permissions can look correct but still behave unexpectedly due to cached tokens or running apps.
  1. Sign out and sign back in (or reboot)
  2. Test access using:
    • A different local user account, or
    • “Run as different user” (where applicable)
  3. Try:
    • Opening files
    • Creating a new file
    • Deleting a file

Tips, Warnings, and Troubleshooting​

Tip: Prefer “Modify” over “Full control”​

  • Modify is usually enough for day-to-day work.
  • Full control includes permission-changing rights, which can increase risk if malware runs under that account.

Warning: Don’t remove SYSTEM or Administrators​

You’ll commonly see:
  • SYSTEM (Windows services and OS components)
  • Administrators (local admin group)
Removing them can cause:
  • Backup failures
  • App issues
  • Inability to recover access later

If you locked yourself out​

If you can’t open the folder anymore:
  1. Right-click folder → PropertiesSecurityAdvanced
  2. Next to Owner, click Change
  3. Set owner to your account or Administrators
  4. Check Replace owner on subcontainers and objects (if needed)
  5. Apply changes
  6. Then add back permissions for your account
Note: Ownership lets you change permissions, but it doesn’t automatically grant access until you add an allow entry.

“Deny” permissions: use only when necessary​

“Deny” is powerful and can override allows. Use it only when:
  • You must block a specific account that otherwise gains access via a group
Otherwise, it’s cleaner to:
  • Remove/limit allow permissions instead of adding denies

Sharing vs NTFS permissions (common confusion)​

  • Sharing permissions apply over the network (SMB shares)
  • NTFS permissions apply locally and over the network
  • The most restrictive combination wins
If users can access locally but not over the network (or vice versa), check the folder’s Sharing settings too.

Conclusion​

Securing a folder with NTFS doesn’t have to mean “disable inheritance and hope for the best.” The safest approach is to keep inheritance enabled, add specific allow permissions for the users who need access, and rely on a well-designed parent folder so the rules flow cleanly to everything inside. Verifying with Effective Access helps ensure the result matches reality.
Key Takeaways:
  • Keep inheritance enabled whenever possible to avoid messy, one-off permission trees.
  • Use a secure parent folder and let permissions inherit downward for clean management.
  • Prefer Modify over Full control and avoid removing SYSTEM/Administrators.
  • Always verify with Effective Access and real-world testing (sign out/in).

This tutorial was generated to help WindowsForum.com users get the most out of their Windows experience.
 

Leaving inheritance on prevents the Access Denied loop, which will lock you out of your own files. Always test these permissions on a dummy folder so you don't unintentionally cause a complete lockout. Should you become locked out, data recovery software provides a safety net by bypassing OS permission limitations. Most utilities allow free tries to show your files are still accessible. Having a recovery plan is far better than losing your data to a settings error.
 

You’re thinking about this the right way (test first, avoid self-lockout), but I’d add two important clarifications so people don’t get a false sense of safety:

1) “Leave inheritance on” is safer, but not the only safe method​

Leaving inheritance enabled often prevents the classic “I removed myself / Administrators and now everything is Access Denied” scenario. It’s especially helpful if you’re not 100% comfortable with NTFS ACLs.
That said, breaking inheritance can be done safely if you:
  • choose “Convert inherited permissions into explicit permissions” (don’t “Remove all”)
  • ensure SYSTEM and Administrators retain Full control
  • ensure your account (or a group you’re in) retains at least Modify (or Full control)
The biggest lockouts happen when someone:
  • disables inheritance and removes Administrators/SYSTEM, or
  • uses Deny entries (Deny is powerful and easy to misuse).
Testing on a dummy folder is absolutely the right habit.

2) “Data recovery software bypasses permissions” is only sometimes true​

It’s a decent last-ditch option for unencrypted NTFS volumes, because many recovery/forensic tools read files “from the outside” and don’t care about Windows ACLs.
But it is not a safety net if either of these are involved:
  • BitLocker / Device Encryption (you still need the recovery key to read anything meaningful)
  • EFS (Encrypting File System) (you need the EFS certificate/private key)
So: recovery tools can bypass ACLs, but they can’t bypass encryption.

Best “recovery plan” for NTFS permission mistakes (built-in tools first)​

If you do lock yourself out, you usually don’t need third-party recovery at all. Use one of these:

A) Take ownership + re-grant rights (GUI)​

  1. Right-click folder → PropertiesSecurityAdvanced
  2. Change Owner to your account (or Administrators)
  3. Tick Replace owner on subcontainers and objects
  4. Add your account (or a group) with Full control
  5. Re-enable inheritance if needed

B) Take ownership + reset ACLs (Command line)​

Open Terminal (Admin):
Code:
takeown /f "D:\Path\To\Folder" /r /d y
icacls "D:\Path\To\Folder" /inheritance:e
icacls "D:\Path\To\Folder" /grant Administrators:(OI)(CI)F /t
icacls "D:\Path\To\Folder" /grant "%username%":(OI)(CI)F /t
If the permissions are truly a mess, a blunt reset can help:
icacls "D:\Path\To\Folder" /reset /t /c
(That restores default inherited permissions from the parent.)

The best protection: backups, not recovery utilities​

If someone is going to experiment with permissions, the real safety net is:
  • a quick file backup of the test folder, and/or
  • a system image (if you’re changing permissions broadly), and
  • knowing where your BitLocker recovery key is stored before you start.
If you tell me what you’re trying to achieve (hide a folder from other local users? protect a share? lock down a subfolder while keeping the parent normal?), I can give the least-risk permission set that accomplishes it without triggering inheritance problems.
 

Back
Top