Windows 7 File Permissions Explained - A Simple Guide

Understanding Windows Permissions
Navigating the intricacies of Windows permissions can often be a complex undertaking. A multitude of factors contribute to this complexity, including share permissions, NTFS permissions, and access control lists (ACLs). This article will detail how these elements interact to govern access to resources.
Share Permissions vs. NTFS Permissions
It’s crucial to differentiate between share permissions and NTFS permissions. Share permissions apply when a resource is accessed over a network, while NTFS permissions control access to resources locally on the machine.
Essentially, share permissions act as the first line of defense, determining if network access is granted. If access is permitted at the share level, NTFS permissions then determine what the user can do with the resource.
Access Control Lists (ACLs) Explained
Access Control Lists (ACLs) are central to how Windows manages permissions. An ACL is a list of entries that specify which users or groups have access to a particular resource.
Each entry within an ACL defines the level of access granted – for example, read, write, or execute. These permissions are applied to both files and folders.
How Permissions Work Together
When a user attempts to access a resource, Windows evaluates both share and NTFS permissions. The most restrictive permission always takes precedence.
For instance, if share permissions allow read-only access, but NTFS permissions grant read/write access, the user will only have read-only access. Conversely, if share permissions are more permissive than NTFS permissions, the NTFS permissions will limit access.
Practical Implications
Understanding this interplay is vital for maintaining data security. Incorrectly configured permissions can lead to unauthorized access or data breaches.
Regularly reviewing and adjusting permissions ensures that only authorized individuals have access to sensitive information. This proactive approach is a cornerstone of robust system administration.
Key Takeaways
- Share permissions control network access.
- NTFS permissions control local access.
- ACLs define specific user/group permissions.
- The most restrictive permission always applies.
Properly managing these elements is essential for a secure and well-functioning Windows environment. A thorough grasp of these concepts empowers administrators to effectively control access to critical resources.
Security Identifiers Explained
Windows operating systems utilize SIDs – Security Identifiers – as a means of uniquely representing all security principals. These SIDs are essentially variable-length strings composed of alphanumeric characters, used to identify machines, users, and groups. Each time permissions are granted to a file or folder for a user or group, their corresponding SID is incorporated into the ACL (Access Control List).
While SIDs are fundamentally stored in binary format, they are presented in a more human-readable syntax within the Windows environment. It’s relatively uncommon to directly encounter SIDs, but they often appear in ACLs when a user account whose permissions have been granted is subsequently deleted.
Understanding the SID Format
The standard notation for SIDs follows a specific structure, comprised of several distinct parts. Let's examine these components:
- An 'S' prefix
- A structure revision number
- A 48-bit identifier authority value
- A variable number of 32-bit sub-authority, or relative identifier (RID), values
To illustrate, consider the SID example shown in the image. We can dissect it to gain a clearer understanding of each section.
The SID Structure:
'S' - This character always initiates a SID, signaling to Windows that the following string represents a security identifier.
'1' - This indicates the revision number of the SID specification. It ensures backward compatibility should the specification undergo changes; currently, Windows 7 and Server 2008 R2 utilize the first revision.
'5' - The Identifier Authority defines the scope in which the SID was generated. Possible values include:
- 0 - Null Authority
- 1 - World Authority
- 2 - Local Authority
- 3 - Creator Authority
- 4 - Non-unique Authority
- 5 - NT Authority
'21' - This represents sub-authority 1, and its value of '21' signifies that the subsequent sub-authorities identify either the Local Machine or a Domain.
'1206375286-251249764-2214032401' - These are sub-authorities 2, 3, and 4, respectively. In this instance, they identify the local machine, but could alternatively represent a Domain identifier.
'1000' - Sub-authority 5 is the final component, known as the RID (Relative Identifier). The RID is unique to each security principal; objects not provided by Microsoft typically have a RID of 1000 or higher.
Therefore, SIDs provide a robust and unique method for identifying security principals within the Windows ecosystem, ensuring accurate access control and security management.
Security Principals
A security principal represents any entity associated with a Security Identifier (SID). These entities can encompass users, computers, and groups alike. Security principals operate either within a local context or within the domain environment.
Local security principals are administered through the Local Users and Groups snap-in, accessible via Computer Management. This can be launched by right-clicking the computer shortcut found in the Start menu and selecting 'Manage'.
Managing Local Security Principals
To introduce a new user security principal, navigate to the Users folder and initiate a right-click action, then select 'New User'.
Upon double-clicking a user account, administrators can assign them to a Security Group via the 'Member Of' tab.
Creating Security Groups
The creation of a new security group is accomplished by navigating to the Groups folder, located on the right-hand side. A right-click within the whitespace followed by selecting 'New Group' will initiate the process.
Share Permissions and NTFS Permissions
Within Windows operating systems, file and folder access is governed by two distinct permission types: Share Permissions and NTFS Permissions, also known as Security Permissions. It’s important to note that, upon sharing a folder, the "Everyone" group is, by default, granted read access.
Folder security is typically managed through a combination of both Share and NTFS Permissions. When this approach is utilized, the most restrictive permission setting will always take precedence. For instance, if Share Permissions are configured to allow everyone read-only access, while NTFS Permissions permit users to modify files, the Share Permission will override, preventing changes.
The Local Security Authority (LSASS) is responsible for controlling resource access when permissions are applied. Upon logging in, users receive an access token containing their Security Identifier (SID). When attempting to access a resource, LSASS compares this SID against the Access Control List (ACL) to determine whether access should be granted or denied.
Regardless of the permission system employed, key differences exist. Let's examine these differences to better understand when each should be used.
Share Permissions: Key Characteristics
- Share Permissions only affect users accessing the resource across a network. They are not applicable to local logins, such as those established via Terminal Services.
- These permissions are applied consistently to all files and folders within the shared resource. For more detailed control, NTFS Permissions should be used in conjunction with Share Permissions.
- For volumes formatted with FAT or FAT32, Share Permissions represent the sole available restriction method, as NTFS Permissions are unsupported on these file systems.
NTFS Permissions: Key Characteristics
- NTFS Permissions can only be configured on volumes formatted with the NTFS file system.
- NTFS Permissions are cumulative. A user’s effective permissions are determined by combining their directly assigned permissions with those inherited from any groups to which they belong.
Understanding these distinctions is crucial for effectively managing file and folder security within a Windows environment. Proper configuration ensures that resources are accessible to authorized users while remaining protected from unauthorized access or modification.
Revised Sharing Permissions in Windows 7
With the release of Windows 7, a simplified sharing method was introduced. Traditional permissions like Read, Change, and Full Control were replaced with a more streamlined system of Read and Read/Write access.
This change was implemented to align with the HomeGroup feature and to facilitate easier file sharing for users with limited technical expertise. Sharing is initiated directly through the context menu, simplifying the process for HomeGroup members.
Sharing Beyond the HomeGroup
For sharing files with individuals outside of the HomeGroup network, the "Specific people..." option remains available. Selecting this option presents a more detailed dialog box.
Within this dialog, users can precisely define access for particular users or user groups, offering greater control over file access.
The Simplified Permission Structure
The new system employs just two permission levels, creating a straightforward, albeit less granular, security model for folders and files.
- Read permission grants users the ability to view files, but prevents any modifications or deletions. It's a "view-only" access level.
- Read/Write permission provides full control, allowing users to open, edit, and delete files as needed. This represents complete access.
Essentially, these two options provide an all-or-nothing approach to protecting your data.
A Shift in File Sharing Options
Previously, the share dialog offered a wider array of options. Users could assign alternative aliases to shared folders, restrict concurrent connections, and customize caching behavior. This functionality hasn't been eliminated in Windows 7; instead, it’s been consolidated under a feature known as "Advanced Sharing."
Accessing a folder’s properties via a right-click menu reveals the "Advanced Sharing" settings located within the sharing tab.

Selecting the "Advanced Sharing" button necessitates local administrator privileges. Once authorized, all the familiar configuration settings from earlier Windows versions become available.

Clicking the "Permissions" button presents the three standard permission levels with which users are generally acquainted.

- Read permission grants the ability to view, open files and subdirectories, and run applications. However, it prevents any modifications.
- Modify permission encompasses all the capabilities of Read permission, and additionally allows for the addition of files and subdirectories, deletion of folders, and alteration of file data.
- Full Control represents the most comprehensive permission level, enabling all preceding permissions. Furthermore, it provides the ability to modify NTFS permissions, applicable only to folders formatted with NTFS.
NTFS Permissions
NTFS Permissions provide a highly detailed level of control over files and folders within a Windows environment. However, the extensive options available can initially seem complex for those unfamiliar with the system. These permissions can be configured both on individual files and on entire folders.
To modify the NTFS Permissions associated with a specific file, locate the file, right-click on it, and select 'Properties' from the context menu. Within the Properties window, navigate to the 'Security' tab.

Initiate the process of editing NTFS Permissions for a particular user or group by clicking the 'Edit' button.

Given the numerous NTFS Permissions available, a breakdown is helpful. Let's begin by examining the permissions applicable to files.
- Full Control grants the ability to read, write, modify, execute, alter attributes, adjust permissions, and assume ownership of the file.
- Modify permits reading, writing, modifying, executing, and changing the file’s attributes.
- Read & Execute allows viewing the file’s data, attributes, owner, and permissions, as well as running the file if it is a program.
- Read enables opening the file, viewing its attributes, owner, and permissions.
- Write allows data to be written to the file, appended to the file, and its attributes to be read or changed.
Folder NTFS Permissions differ slightly from those of files, so a separate review is necessary.

- Full Control provides the ability to read, write, modify, and execute files within the folder, change attributes, permissions, and take ownership of the folder or its contents.
- Modify allows reading, writing, modifying, and executing files within the folder, and changing the attributes of the folder or its contents.
- Read & Execute enables displaying the folder’s contents and viewing the data, attributes, owner, and permissions of files within, as well as running files within the folder.
- List Folder Contents allows displaying the folder’s contents and viewing the data, attributes, owner, and permissions of files contained within.
- Read enables displaying the file’s data, attributes, owner, and permissions.
- Write allows data to be written to the file, appended to the file, and its attributes to be read or changed.
According to Microsoft’s official documentation, the "List Folder Contents" permission also allows for the execution of files within the folder. However, enabling "Read & Execute" is still required to fully facilitate this functionality. This permission can be particularly confusing due to its documentation.
Understanding Windows 7 File and Folder Security
To begin, it's important to recognize that user accounts and groups within Windows 7 are fundamentally represented by an alphanumeric string known as a SID (Security Identifier). This SID serves as the core identifier for security purposes.
SIDs and Permissions
Both Share and NTFS permissions are directly linked to these SIDs. This means access control is managed by associating permissions with specific SIDs, rather than directly with user names or group names.
Share Permissions: Network Access
Share permissions are specifically evaluated by the LSSAS (Local Security Authority Subsystem) only when files or folders are accessed across a network. They govern access for remote users.
Essentially, these permissions act as the first line of defense when a user attempts to connect to a shared resource from another computer.
NTFS Permissions: Local Access
Conversely, NTFS permissions are enforced solely on the local machine. They control access for users who are directly interacting with the file system.
These permissions are applied regardless of whether the access is local or remote, but they only take effect on the computer where the files and folders reside.
Key Differences Summarized
- Share Permissions: Network access only, checked by LSSAS.
- NTFS Permissions: Local access only.
- Both: Tied to SIDs, not user/group names.
A comprehensive grasp of these concepts is crucial for effectively managing file and folder security within a Windows 7 environment. Understanding how SIDs, Share permissions, and NTFS permissions interact is key to maintaining a secure system.
Should any questions arise regarding the implementation of Windows 7's file and folder security, please don't hesitate to post them in the comments section.





