Set NTFS Permissions the Right Way: Secure a Folder Without Breaking Inheritance
Difficulty: Intermediate | Time Required: 15 minutesNTFS permissions are one of Windows’ best security features—but they’re also one of the easiest ways to accidentally lock yourself out or create a messy “why can’t anyone access this?” situation. A common mistake is disabling inheritance on a folder (or copying random permissions) and then spending hours repairing access down the tree.
This tutorial shows a clean, reliable approach to securing a folder while preserving inheritance where it helps you—so your permissions stay predictable, manageable, and recoverable. Steps apply to Windows 10 (1909+) and Windows 11, with minor UI differences.
Prerequisites
Before you start, make sure you have:- An administrator account on the PC
- A clear goal: Who should have access? Who should not?
- A folder to secure (ideally not a Windows system folder like
C:\WindowsorC:\Program Files) - (Recommended) A quick backup of anything important in the folder
Note: NTFS permissions apply only on NTFS-formatted drives. If the folder is on FAT32/exFAT, the Security tab won’t work the same way.
Step-by-Step: Secure a Folder Without Breaking Inheritance
Step 1) Choose the correct folder location
- Pick (or create) the folder you want to secure, e.g.:
D:\PrivateC:\Users\<You>\Documents\Private
- Avoid applying custom NTFS permissions to:
C:\WindowsC:\Program FilesC:\ProgramData- The root of the system drive (
C:\) unless you fully understand the consequences
Why: System folders have complex, OS-managed permissions. Custom changes can break updates, apps, or Windows itself.
Step 2) Open the Advanced Security settings
- Right-click the folder → Properties
- Open the Security tab
- Click Advanced
- Owner
- Inheritance status
- Permission entries (ACL)
Step 3) Confirm inheritance is enabled (and keep it enabled)
In the Advanced Security window:- Look for “Inheritance: Enabled”
- If it says Disabled, click Enable inheritance
Warning: If inheritance is disabled, permissions become “unique” and harder to manage. This tutorial’s goal is to avoid that unless there’s a very specific reason.
Step 4) Add the user/group you want to allow (without removing inherited entries)
Instead of stripping the ACL, we’ll add explicit permissions for the folder while leaving inherited ones intact.- Click Add
- Click Select a principal
- Type the account name (examples):
- Your username:
YourPC\YourName - A local group:
Users - A Microsoft account user might appear as the local profile name
- Your username:
- Click Check Names → OK
- Under Basic permissions, choose one:
- Modify (recommended for personal folders)
- Read & execute (if you want read-only access)
- Full control (use sparingly)
- Under Applies to, keep:
- This folder, subfolders and files (typical)
- Click OK
Tip: Prefer assigning permissions to a group (like a custom group or “Users”) instead of many individual accounts. It scales better.
Step 5) Reduce access for “Users” (without breaking inheritance)
Here’s the key idea: don’t disable inheritance. Instead, add a targeted rule that reduces access where needed.If you want only your account (and admins/SYSTEM) to access the folder:
- In Advanced Security, review entries like:
SYSTEMAdministrators- Your user account
UsersorAuthenticated Users
- If
UsersorAuthenticated Usershas permissions you don’t want:- Select that entry → Edit (or double-click it)
- Change permissions to Read & execute (or remove write access)
- Ensure Applies to covers the correct scope (usually “This folder, subfolders and files”)
Important: In many environments,UsersorAuthenticated Usersis inherited from a parent folder. Editing or removing an inherited entry might not be allowed unless you change the parent or disable inheritance.
Better approach: If this folder is inside your user profile (C:\Users\<You>\...), it often already has safe defaults. If it’s on a shared data drive, consider making a dedicated parent folder with correct inheritance (see Step 6).
Step 6) (Best practice) Create a “secure parent folder” and inherit downward
This is the cleanest long-term strategy: set permissions on a parent folder and let everything underneath inherit.- Create a parent folder, e.g.
D:\Data_Secure - Move your target folder inside it, e.g.
D:\Data_Secure\Private - Apply your desired permissions to
D:\Data_Secure:- Keep inheritance enabled on
D:\Data_Secure(fromD:\) - Add explicit permissions for your chosen users/groups
- Avoid unique permissions on many subfolders
- Keep inheritance enabled on
Why this works: You avoid per-folder “special cases.” Inheritance becomes your friend instead of the thing you fight.
Step 7) Use “effective access” to verify your results
Windows can show what access a user actually has after all inheritance and groups are considered.- In Advanced Security, click Effective Access
- Click Select a user
- Enter the account you’re testing (for example, a standard user)
- Click View effective access
- Expected users have Modify/Read as intended
- Unwanted users show “No access” or limited permissions
Tip: This is the fastest way to catch surprises from group membership (like someone being in “Administrators” or another allowed group).
Step 8) Test in real life (recommended)
Permissions can look correct but still behave unexpectedly due to cached tokens or running apps.- Sign out and sign back in (or reboot)
- Test access using:
- A different local user account, or
- “Run as different user” (where applicable)
- Try:
- Opening files
- Creating a new file
- Deleting a file
Tips, Warnings, and Troubleshooting
Tip: Prefer “Modify” over “Full control”
- Modify is usually enough for day-to-day work.
- Full control includes permission-changing rights, which can increase risk if malware runs under that account.
Warning: Don’t remove SYSTEM or Administrators
You’ll commonly see:SYSTEM(Windows services and OS components)Administrators(local admin group)
- Backup failures
- App issues
- Inability to recover access later
If you locked yourself out
If you can’t open the folder anymore:- Right-click folder → Properties → Security → Advanced
- Next to Owner, click Change
- Set owner to your account or Administrators
- Check Replace owner on subcontainers and objects (if needed)
- Apply changes
- Then add back permissions for your account
Note: Ownership lets you change permissions, but it doesn’t automatically grant access until you add an allow entry.
“Deny” permissions: use only when necessary
“Deny” is powerful and can override allows. Use it only when:- You must block a specific account that otherwise gains access via a group
- Remove/limit allow permissions instead of adding denies
Sharing vs NTFS permissions (common confusion)
- Sharing permissions apply over the network (SMB shares)
- NTFS permissions apply locally and over the network
- The most restrictive combination wins
Conclusion
Securing a folder with NTFS doesn’t have to mean “disable inheritance and hope for the best.” The safest approach is to keep inheritance enabled, add specific allow permissions for the users who need access, and rely on a well-designed parent folder so the rules flow cleanly to everything inside. Verifying with Effective Access helps ensure the result matches reality.Key Takeaways:
- Keep inheritance enabled whenever possible to avoid messy, one-off permission trees.
- Use a secure parent folder and let permissions inherit downward for clean management.
- Prefer Modify over Full control and avoid removing SYSTEM/Administrators.
- Always verify with Effective Access and real-world testing (sign out/in).
This tutorial was generated to help WindowsForum.com users get the most out of their Windows experience.