Understanding the Matrix

How to interpret the matrix view: abbreviations, tooltips, and permission types at a glance.

Introduction

The matrix view in the NTFS analysis of Docusnap365 shows in detail which rights a principal (user or group) has on a specific folder. To work effectively with it, it is important to understand the abbreviations and visual logic.

Structure of the Matrix

The matrix consists of:

  • Rows: Principals (users, groups, SIDs)
  • Columns: Individual permissions or permission groups
  • Cells: Green checks indicate active permissions

Depending on the analysis mode, share, NTFS, and effective permissions are displayed in combination.

Abbreviations and Their Meanings

Basic Permissions

AbbreviationMeaning
Full ControlFull access to the object
ModifyModify
ReadExecRead, Execute
ListFolderDisplay folder contents
ReadRead
WriteWrite

Advanced Permissions

AbbreviationMeaning
Traverse | ExecTraverse folder / Execute file
List | ReadFileList folder / Read file
ReadAttrRead attributes
ReadExtAttrRead extended attributes
CreateFile | WriteCreate files / Write
CreateDir | AppendCreate folders / Append data
WriteAttrWrite attributes
WriteExtAttrWrite extended attributes
DelSubFoldersDelete subfolders and files
DeleteDelete
ReadPermRead permissions
ChangePermChange permissions
TakeOwnTake ownership

Inheritance Context

AbbreviationScope of the Permission
ThisFolderThis folder only
FolderSubFilesThis folder, subfolders, and files
FolderSubThis folder and subfolders
FolderFilesThis folder and files
SubFoldersFilesSubfolders and files only
SubFoldersSubfolders only
FilesOnlyFiles only

Additional Notes on the Display

  • Effective permissions are highlighted and combine explicit, inherited, and share permissions.
  • Unresolvable SIDs also appear in the matrix — usually shown with a numeric value.
  • User status (active/inactive) may be visually highlighted by color or icon.

Summary

The matrix enables:

  • a complete overview of assigned permissions,
  • a detailed distinction between sources of rights (explicit, inherited, share),
  • targeted identification of permission anomalies.

It is therefore the central tool for audits, cleanup, and permission management.