When I try to get permission to view it with "Advanced Security Settings for WindowsApps"
it gives me "This access control entry is corrupt.Delete it and create a new one".
Before I even try to delete it, I'm wondering if it would be safe to even try.
Everything seems to be working, and the folder passes all AV scans.
I've run Dism and Sfc as well; all ok.
And yes, I have googled; including this; https://learn.microsoft.com/en-us/answers/questions/2728849/access-control-entry-is-corrupt
Expert experience and help is welcome.
Ed
On Tue, 9/2/2025 7:58 AM, Ed Cryer wrote:I can't get to your image. Secure connection failed.
When I try to get permission to view it with "Advanced Security Settings for WindowsApps"
it gives me "This access control entry is corrupt.Delete it and create a new one".
Before I even try to delete it, I'm wondering if it would be safe to even try.
Everything seems to be working, and the folder passes all AV scans.
I've run Dism and Sfc as well; all ok.
And yes, I have googled; including this;
https://learn.microsoft.com/en-us/answers/questions/2728849/access-control-entry-is-corrupt
Expert experience and help is welcome.
Ed
It depends what you want to do in there. Most of the time, I just like to note the contents,
and a read-only method is all I want.
[Picture]
https://i.postimg.cc/1X7MLtSv/access-restrictions.gif
What the picture shows, is me making a Macrium Reflect backup of C: ,
using the Macrium Mounter to mount the backup image as the letter K: ,
and me ticking the nice box that "removes access restrictions". Later,
you can right-click K: and use Macrium again to dismount the MRIMG file.
I can traverse K: and look in the folders in there. Activity with
respect to the MRIMG is read-only, so pretending to delete things
from K: is not having an effect on the contents of the MRIMG file.
From Linux, you can have some amount of fun in C: too.
But the access is not without surprises (I/O Error which is a
fake I/O error). Linux now has two NTFS drivers, one is the FUSE driver.
And you can select which driver to use, for doing a mount of a
partition such as C: .
"Permissions" are not the only protection feature in Windows. An example
of one of these is MIC (Mandatory Integrity Control). TrustedInstaller,
you probably know the details of that one (for protecting Program Files content from modification). You can impersonate TrustedInstaller. On occasion, the programs that do the impersonation for you, are
"busted" on Windows, and maybe a couple months later, they are
working again. It is hard to say what-all is accounting for this
(the behind the scenes jibber-jabber).
Paul
On 9/2/25 11:43 AM, Paul wrote:
On Tue, 9/2/2025 7:58 AM, Ed Cryer wrote:I can't get to your image.˙˙ Secure connection failed.
When I try to get permission to view it with "Advanced Security
Settings for WindowsApps"
it gives me "This access control entry is corrupt.Delete it and
create a new one".
Before I even try to delete it, I'm wondering if it would be safe to
even try.
Everything seems to be working, and the folder passes all AV scans.
I've run Dism and Sfc as well; all ok.
And yes, I have googled; including this;
https://learn.microsoft.com/en-us/answers/questions/2728849/access-
control-entry-is-corrupt
Expert experience and help is welcome.
Ed
It depends what you want to do in there. Most of the time, I just like
to note the contents,
and a read-only method is all I want.
˙˙˙ [Picture]
˙˙˙˙ https://i.postimg.cc/1X7MLtSv/access-restrictions.gif
What the picture shows, is me making a Macrium Reflect backup of C: ,
using the Macrium Mounter to mount the backup image as the letter K: ,
and me ticking the nice box that "removes access restrictions". Later,
you can right-click K: and use Macrium again to dismount the MRIMG file.
I can traverse K: and look in the folders in there. Activity with
respect to the MRIMG is read-only, so pretending to delete things
from K: is not having an effect on the contents of the MRIMG file.
˙From Linux, you can have some amount of fun in C: too.
But the access is not without surprises (I/O Error which is a
fake I/O error). Linux now has two NTFS drivers, one is the FUSE driver.
And you can select which driver to use, for doing a mount of a
partition such as C: .
"Permissions" are not the only protection feature in Windows. An example
of one of these is MIC (Mandatory Integrity Control). TrustedInstaller,
you probably know the details of that one (for protecting Program Files
content from modification). You can impersonate TrustedInstaller. On
occasion, the programs that do the impersonation for you, are
"busted" on Windows, and maybe a couple months later, they are
working again. It is hard to say what-all is accounting for this
(the behind the scenes jibber-jabber).
˙˙˙ Paul
On 9/2/2025 12:52 PM, Alan K. wrote:
On 9/2/25 11:43 AM, Paul wrote:
On Tue, 9/2/2025 7:58 AM, Ed Cryer wrote:I can't get to your image.˙˙ Secure connection failed.
When I try to get permission to view it with "Advanced Security
Settings for WindowsApps"
it gives me "This access control entry is corrupt.Delete it and
create a new one".
Before I even try to delete it, I'm wondering if it would be safe to
even try.
Everything seems to be working, and the folder passes all AV scans.
I've run Dism and Sfc as well; all ok.
And yes, I have googled; including this;
https://learn.microsoft.com/en-us/answers/questions/2728849/access-
control-entry-is-corrupt
Expert experience and help is welcome.
Ed
It depends what you want to do in there. Most of the time, I just like
to note the contents,
and a read-only method is all I want.
˙˙˙ [Picture]
˙˙˙˙ https://i.postimg.cc/1X7MLtSv/access-restrictions.gif
What the picture shows, is me making a Macrium Reflect backup of C: ,
using the Macrium Mounter to mount the backup image as the letter K: ,
and me ticking the nice box that "removes access restrictions". Later,
you can right-click K: and use Macrium again to dismount the MRIMG file. >>>
I can traverse K: and look in the folders in there. Activity with
respect to the MRIMG is read-only, so pretending to delete things
from K: is not having an effect on the contents of the MRIMG file.
˙From Linux, you can have some amount of fun in C: too.
But the access is not without surprises (I/O Error which is a
fake I/O error). Linux now has two NTFS drivers, one is the FUSE driver. >>> And you can select which driver to use, for doing a mount of a
partition such as C: .
"Permissions" are not the only protection feature in Windows. An example >>> of one of these is MIC (Mandatory Integrity Control). TrustedInstaller,
you probably know the details of that one (for protecting Program Files
content from modification). You can impersonate TrustedInstaller. On
occasion, the programs that do the impersonation for you, are
"busted" on Windows, and maybe a couple months later, they are
working again. It is hard to say what-all is accounting for this
(the behind the scenes jibber-jabber).
˙˙˙ Paul
No problem here
On 9/2/25 2:42 PM, sticks wrote:
On 9/2/2025 12:52 PM, Alan K. wrote:Working now.
On 9/2/25 11:43 AM, Paul wrote:
On Tue, 9/2/2025 7:58 AM, Ed Cryer wrote:I can't get to your image.˙˙ Secure connection failed.
When I try to get permission to view it with "Advanced Security
Settings for WindowsApps"
it gives me "This access control entry is corrupt.Delete it and
create a new one".
Before I even try to delete it, I'm wondering if it would be safe to >>>>> even try.
Everything seems to be working, and the folder passes all AV scans.
I've run Dism and Sfc as well; all ok.
And yes, I have googled; including this;
https://learn.microsoft.com/en-us/answers/questions/2728849/access-
control-entry-is-corrupt
Expert experience and help is welcome.
Ed
It depends what you want to do in there. Most of the time, I just like >>>> to note the contents,
and a read-only method is all I want.
˙˙˙˙ [Picture]
˙˙˙˙˙ https://i.postimg.cc/1X7MLtSv/access-restrictions.gif
What the picture shows, is me making a Macrium Reflect backup of C: ,
using the Macrium Mounter to mount the backup image as the letter K: , >>>> and me ticking the nice box that "removes access restrictions". Later, >>>> you can right-click K: and use Macrium again to dismount the MRIMG file. >>>>
I can traverse K: and look in the folders in there. Activity with
respect to the MRIMG is read-only, so pretending to delete things
from K: is not having an effect on the contents of the MRIMG file.
˙˙From Linux, you can have some amount of fun in C: too.
But the access is not without surprises (I/O Error which is a
fake I/O error). Linux now has two NTFS drivers, one is the FUSE driver. >>>> And you can select which driver to use, for doing a mount of a
partition such as C: .
"Permissions" are not the only protection feature in Windows. An example >>>> of one of these is MIC (Mandatory Integrity Control). TrustedInstaller, >>>> you probably know the details of that one (for protecting Program Files >>>> content from modification). You can impersonate TrustedInstaller. On
occasion, the programs that do the impersonation for you, are
"busted" on Windows, and maybe a couple months later, they are
working again. It is hard to say what-all is accounting for this
(the behind the scenes jibber-jabber).
˙˙˙˙ Paul
No problem here
Sysop: | Tetrazocine |
---|---|
Location: | Melbourne, VIC, Australia |
Users: | 12 |
Nodes: | 8 (0 / 8) |
Uptime: | 44:24:33 |
Calls: | 173 |
Files: | 21,502 |
Messages: | 79,839 |