NTFS and Share Permissions — Controlling File System Access

NTFS-PERMISSIONS

How Windows controls access to files and folders through NTFS permissions applied directly to the file system — covering the six standard permissions, inheritance and propagation, effective permissions calculation, and how NTFS and network share permissions combine when accessing files over the network.

windowsntfspermissionsfile-systemshare-permissions

Overview

Every file and folder on an NTFS volume carries an Access Control List (ACL) — a set of rules that determine who can do what with that object. When a user opens a file, executes a program, or tries to delete a folder, the Windows security subsystem evaluates the ACL against the user’s access token (which contains the user’s SID and all group SIDs) and either permits or denies the operation. This evaluation happens whether the access is local or over the network, and it is the primary mechanism by which Windows enforces file-level security.


NTFS Standard Permissions

The six standard permissions are the permissions visible in the Security tab of any file or folder’s Properties dialog. Each is actually a pre-defined combination of more granular special permissions — they exist to make common permission assignments straightforward without requiring knowledge of all 13 underlying special permissions.

PermissionOn FilesOn Folders
Full ControlRead, write, modify, delete the file; change permissions; take ownershipAll file permissions plus delete subfolders and files within; change permissions on subfolders; take ownership of subfolders
ModifyRead and write the file, delete itCreate, delete, and modify files and subfolders; does NOT include changing permissions or taking ownership
Read & ExecuteOpen and read the file; execute if it is an executableList folder contents, traverse into subfolders, execute files within
List Folder ContentsNot applicable to filesList the names of files and subfolders; does not grant access to the file contents themselves
ReadOpen and read the file contents and attributesList contents and read files within; equivalent to Read & Execute for folders
WriteWrite to the file or append to it; create new files in the containing folderCreate new files and subfolders; write to files

The distinction between Modify and Full Control is significant: Modify does not include the ability to change permissions or take ownership. A user with Modify on a folder can read, write, and delete its contents but cannot reassign who else has access to it. Full Control allows the holder to rewrite the ACL entirely.


NTFS Special Permissions

Behind the standard permissions are 13 special (advanced) permissions that provide precise control when the standard set is not granular enough.

Special PermissionApplies ToEffect
Traverse Folder / Execute FileFolders / FilesPass through a folder to reach objects below it; run an executable
List Folder / Read DataFolders / FilesSee file and subfolder names; open and read file data
Read AttributesBothSee basic attributes (read-only, hidden, system, archive)
Read Extended AttributesBothSee vendor-defined extended attributes
Create Files / Write DataFolders / FilesCreate new files in the folder; overwrite file contents
Create Folders / Append DataFolders / FilesCreate new subfolders; append to a file without overwriting existing content
Write AttributesBothChange basic attributes
Write Extended AttributesBothChange extended attributes
Delete Subfolders and FilesFoldersDelete contents of a folder even without Delete permission on individual items
DeleteBothDelete the specific file or folder
Read PermissionsBothView the ACL of the object
Change PermissionsBothModify the ACL of the object
Take OwnershipBothTake ownership of the object (owner can always reset permissions)

The Traverse Folder permission deserves special attention. By default, Windows applies “bypass traverse checking” to all users — a user can navigate through a folder they do not have List permission on, as long as they know the path of the object they want to reach. This default behaviour means that denying List Folder Contents on a parent folder does not prevent access to explicitly permitted child objects if the user knows the path.


Inheritance and Propagation

By default, every new file and folder inside an NTFS directory inherits the permissions of its parent. This inheritance chain flows downward from the root of the volume. The Security tab shows inherited permissions in grey (they cannot be edited at the child object without breaking inheritance).

Breaking inheritance: Right-clicking a folder, opening Properties > Security > Advanced > Disable Inheritance presents two choices:

Propagation scope: When adding permissions, the “Applies to” dropdown controls which objects within the folder hierarchy the permission affects.

Applies to settingEffect
This folder onlyThe permission applies only to this folder object, not its contents
This folder, subfolders and filesInherits down the full tree — the most common setting
This folder and subfoldersApplies to folders only, not files within them
This folder and filesApplies to the folder and its immediate files, not subfolders
Subfolders and files onlyDoes not apply to the folder itself
Subfolders only / Files onlyPrecise targeting for unusual access requirements

Effective Permissions

The effective permission a user has on an object is the cumulative result of all explicit and inherited permissions across every group the user belongs to. Windows reads the user’s access token (SID plus all group SIDs) and evaluates the ACL against every entry.

Allow entries accumulate: If the user is in GroupA (which has Read) and GroupB (which has Write), the effective permission is Read + Write.

Deny overrides Allow: If any applicable ACE is a Deny, it overrides any Allow for the same permission. This applies even across groups: a user in GroupA (Allow Read) and GroupB (Deny Read) has an effective permission of Deny Read.

Precedence order when there is a conflict:

  1. Explicit Deny (highest priority)
  2. Explicit Allow
  3. Inherited Deny
  4. Inherited Allow (lowest priority)

An explicit Allow at the child level can override an inherited Deny from the parent. This is the mechanism used when a folder denies access to a group but a specific subfolder needs to allow that group in. The administrator places an explicit Allow on the subfolder — the explicit Allow takes precedence over the inherited Deny.

The Advanced Security Settings dialog includes an Effective Access tab. Entering a user or group name there shows the calculated effective permissions Windows would grant that identity to the selected object, taking all group memberships and inheritance into account.


Share Permissions

Share permissions are a separate, simpler access control mechanism that applies only when a resource is accessed over the network via SMB. They are not NTFS permissions — they exist at the share level, not the file system level.

Share PermissionAccess Granted
ReadView file names, folder names, and file contents; run programs
ChangeRead plus create, modify, and delete files and subfolders
Full ControlChange plus change permissions on the share (not on the NTFS objects)

Share permissions apply only to network access. A user sitting at the console and opening a file directly never encounters share permissions — only NTFS permissions apply for local access.


The Combination Rule: Most Restrictive Wins

When a user accesses a file over the network, Windows evaluates both the share permissions and the NTFS permissions independently, then applies the more restrictive result.

Example: A user has Change permission on the share and Read & Execute permission on the NTFS ACL. The effective network access is Read & Execute — the NTFS permission is more restrictive, so it wins.

Example: A user has Full Control on the share and Full Control on the NTFS ACL. The effective access is Full Control — both agree.

Best practice: Grant Everyone (or Authenticated Users) Full Control at the share permission level and manage all access control exclusively through NTFS permissions. This simplifies troubleshooting — there is only one place to look when access problems arise. Share permissions are a coarse-grained gate; NTFS is where precise access control belongs.


Ownership and the Owner Advantage

Every file and folder has an owner. By default, the owner is the account that created the object. The owner of an object always retains the ability to change the permissions on that object, even if they have been explicitly denied all access. This is a deliberate safeguard: it prevents an administrator from being permanently locked out of an object by a misconfigured ACL.

Ownership cannot be given — it can only be taken. An administrator can take ownership of any file or folder on the system via Properties > Security > Advanced > Owner > Change. This is the recovery path when an administrator needs to regain access to a file where the ACL has been set to deny all access. The icacls utility and the takeown command perform ownership operations from the command line.


EFS Interaction with NTFS Permissions

The Encrypting File System (EFS) adds a second layer of access control that operates independently of NTFS permissions. An EFS-encrypted file is protected by the user’s EFS certificate in addition to the NTFS ACL. Even if a user has Full Control NTFS permission on an encrypted file, they cannot read the file contents without the EFS private key.

Key behavioural points: