- AccessEnum shows permission deviations from the parent element
- Summary in reading, writing and deny to detect real risks
- Export results and compare with baseline for audits
- Options and exclusions refine analysis of files and the Registry

If you work with Windows and you are worried about who can open, modify or deny access to folders and files and Registry keys, AccessEnum is a great little ally. In a matter of seconds, it paints a comprehensive picture of permissions, perfect for locating deviations, strengthening controls, and eliminating security holes in one fell swoop. It is light, direct and tremendously useful for quick audits and hardening tasks.
Most tools fall short in displaying permissions at the click of a button, but AccessEnum cuts through the noise and highlights only what's "out of the ordinary." Works with standard Windows security APIs to condense into one view what would normally require reviewing ACL by ACL across the entire file system or Registry tree.
What is AccessEnum and why it matters
AccessEnum is a Sysinternals utility, created by Mark Russinovich and Bryce Cogswell, that allows you to instantly view who has read, write, or deny access to file system paths and registry branches. Its philosophy is to show differences from the parent directory or key., so you can detect where permissions have been relaxed or where they deviate from standard policy.
The tool serves both for security diagnostics and incident response. The key value is in its speed and clarity of results: By listing only deviations, the analyst does not get lost among thousands of identical and irrelevant entries.
Practical information that is worth having at hand: download size close to 135 KB, Disk and File Utilities category, stable version 1.35, and compatibility with Windows 11, 10, 8.1, 8, 7 and Vista. It can be downloaded or run directly via Sysinternals Live for cases where you don't want to install or copy more than what is essential.
How exactly does it work
Behind the scenes, AccessEnum queries access control lists (ACLs) using the Windows security APIs and abstracts them into three readable states: read, write, and deny. The listview is filled with these three decision axes, which are the ones that are really interesting when evaluating risk and consistency of permissions.
The comparison logic against the parent element is clever. AccessEnum considers permissions equivalent when they share the same access “type” (read, write, deny), even if the exact subset differs. For example, if a file grants only a specific write right (e.g., owner write) and the parent grants “some” write, they are treated as equivalent in the write dimension.
To give you an idea: it doesn't try to check all ACEs bit by bit, but rather groups them by functional categories (read, write, deny). This reduces false positives and highlights true deviations. affecting the exposure surface.
Different treatment in folders and files
AccessEnum handles directories and files with a slight difference in approach. In the case of files, it only highlights them when their permissions are less restrictive than those of their containing folder.This prioritizes what actually increases risk by "opening" access to a specific file too far.
If you prefer a different behavior, you can change it in the Options menu. The tool is flexible to fit your policies Now how do you define “deviation” in your organization?
How to summarize and clean the account list
Another success is that AccessEnum does not flood the result with redundant accounts. When a user belongs to a group that already has the same permission, the individual user is hidden. in the listing for that dimension (read, write, or deny). For example, if Bob and the Marketing group both have read access, and Bob is in Marketing, only Marketing will be displayed.
This “collapse of duplicates” makes the output much more readable. Fewer lines, same essential informationFor quick analysis, this visual cleanup makes the difference between detecting a problem in seconds or wasting minutes navigating through duplicate entries.
Installation and execution
There is no installer with wizards or complicated dependencies. It is a portable GUI executable: Copy AccessEnum to an accessible path and double-click it. If you prefer, you can use Sysinternals Live to "Run Now" without downloading locally.
For restricted environments, this portability is gold. Minimizes footprint and speeds up start-up, ideal for audits, incident response, or specific hardening work on equipment where you don't want to alter much of anything.
Scans and scope
The scan can be directed at the entire file system or a specific portion, and the same applies to the Registry. By default, directories with different permissions than their parent directory and files with less strict permissions than their folder are displayed. Review file access and modifications It is a useful complementary practice when you are comparing audits.
From Options you can adjust comparison and scope criteria, as well as exclusions. This allows you to adapt the analysis to your case.: from a fine-grained audit of a Registry branch to a review of a sensitive network share.
Interface, sorting and quick actions
Once the scan is complete, you can sort any column in ascending or descending order by clicking on its header several times. Sorting helps you prioritize what's most critical, whether by route, type of permit or accounts involved.
The context menu on a line offers very practical actions: view the item's properties, exclude it from view, or open its location (file or key) using Explore. These actions save jumping between tools and streamline the verification flow.
Save results and compare with a baseline
AccessEnum allows you to export the result to a text file. This snapshot is later used to compare changes. after a permissions change, an update, or an incident. It's a simple way to establish a baseline and monitor for regressions.
A typical scenario: You save the status of a “confidential” folder, apply the hardened policy, and then re-analyze it later to see if anything has moved. The comparison confirms whether relaxed permissions have been reintroduced or if everything is still in order.
Noise control and exclusion options
To maintain focus, you can define route or pattern exclusions. This is useful when you know directories with special settings or accounts you don't want to see again in each analysis. Maintaining a consolidated set of exclusions speeds up periodic audits.
Remember to explore the help menu, Contents. Search conditions and comparison logic are detailed there., in case you need to understand down to the last detail how and why each entry appears.
Recommended use cases
Audit permissions before a server migration, review of network shares, hardening verification after a new policy, or rapid forensic analysis after an incident. Whenever you need a quick photo of where doors have been “opened”, AccessEnum fits like a glove.
Furthermore, being extremely lightweight, it is viable in equipment with limited operating freedoms. Its portability and zero installation reduce friction with operations and they let you in and out quickly.
Download, Live Run, and Compatibility
The binary is approximately 135KB in size and is included in the Sysinternals suite. You can download it or run it directly from Sysinternals Live, ideal when you don't want to leave any artifacts behind. It works on Windows 11, 10, 8.1, 8, 7, and Vista, in both home and business environments.
AccessEnum is part of a larger ecosystem of well-known utilities. Sysinternals was founded in 1996 and acquired by Microsoft in 2006.Since then, its tools have continued to be updated and have become the de facto standard for administration and diagnostics.
Relationship with other Sysinternals tools
While the focus here is on AccessEnum, understanding its context within Sysinternals helps build a complete diagnostic toolkit. Autoruns, for example, displays and manages autostart locations. with the most extensive list and ordered by categories.
With Autoruns, you can hide Microsoft entries to focus only on third-party software, and it has integration with VirusTotal. Pink entries usually indicate files without a valid signature. or with verification issues; yellow indicates nonexistent or inaccessible routes that should be reviewed before disabling.
Process Explorer takes the classic to the next level Task Manager. Allows you to view process hierarchy, loaded DLLs, open handles, signature verification, process timeline, color coding, and a bottom panel with deep details.
Process Monitor captures real-time activity from the file system, registry, and processes, with advanced filters, comprehensive event properties, and logging to file. It is key in researching complex problems or hunting for malware, as it shows the detailed interaction of processes with the system.
TCPView lists all TCP/UDP endpoints live, including local/remote address, status, and associated process. Very useful for detecting suspicious connections or anomalous network activity without struggling with cryptic netstat outputs.
BGInfo paints system data on the desktop background, ideal for visual inventory; Contig defragments individual files; Desktops creates virtual desktops even on older versions; DiskMon monitors hot sectors; Disk2vhd converts physical disks to VHDs; PsTools provides command-line utilities commands for remote tasks; PsExec allows you to run processes remotely without agents.Sysmon logs advanced security events for later correlation; and ZoomIt is perfect for technical presentations with zooming and on-screen drawing.
Tips for working with AccessEnum
Clearly define the scope before scanning. You will avoid massive results and focus on what is relevant., such as a sensitive registry branch or a critical share. If possible, create exclusions to reduce known noise.
Establish a saved baseline after applying your “good” policy. Comparing with previous snapshots is the most reliable way to detect regressions over time or after software changes.
Combine AccessEnum results with Process Monitor or TCPView when you suspect permission abuse. See who can write and what that process does next. It offers you a 360-degree view of the real risk.
Integrate authoring and digital signatures into your analysis with Process Explorer. Validating editors and binaries reduces the margin of error when making containment or cleanup decisions.
Passionate writer about the world of bytes and technology in general. I love sharing my knowledge through writing, and that's what I'll do on this blog, show you all the most interesting things about gadgets, software, hardware, tech trends, and more. My goal is to help you navigate the digital world in a simple and entertaining way.