How to View Hidden Files
Windows assigns each file two attributes that control whether File Explorer displays it: the Hidden attribute and the System attribute. When either attribute is set, File Explorer omits the file from the default view. The intent is to keep system-critical files and rarely-accessed configuration files out of sight of casual users. The side effect is that Unturned™ mod developers cannot see important folders such as %AppData%, which contains user configuration and is hidden by default.
This article explains how to enable hidden file display in File Explorer, the difference between Hidden and System attributes, which hidden folders matter for mod development, and how to decide whether to show or keep hiding system files. 57 Studios™ projects routinely require visiting hidden folders, and a developer who cannot see them is permanently locked out of half the file system.
Cohort modders enable hidden file display on every fresh Windows installation as part of the standard onboarding checklist. The configuration takes approximately fifteen seconds and applies system-wide for the logged-in user. The benefit accumulates across every subsequent file operation: a modder with hidden items visible can navigate freely into AppData, ProgramData, and other hidden parents, while a modder with hidden items hidden must repeatedly type environment-variable paths to reach the same locations.
Prerequisites
You must have File Explorer open and should have already enabled file extensions. If you have not, read How to View File Extensions first. The two settings are typically enabled together.
What you will learn
- What the Hidden and System file attributes mean
- How to enable hidden file display on Windows 11
- How to enable hidden file display on Windows 10
- The hidden folders Unturned modders visit most often
- The difference between hidden files and system files
- When to show system files and when to leave them hidden
- How to manually set or clear the Hidden attribute on individual files
- The historical reasons behind the Hidden and System attributes
What the Hidden attribute actually is
Every file on a Windows NTFS-formatted drive has a small set of attribute flags that describe its state. The relevant flags for visibility are:
- Hidden (H) — File Explorer hides the file from the default view. Used for user-level configuration that should not clutter normal browsing.
- System (S) — File Explorer treats the file as protected. Used for operating system files that must not be accidentally modified.
- Read-only (R) — The file cannot be modified without first removing the flag. Visibility is unaffected.
- Archive (A) — Marker used by backup software to track changed files. Visibility is unaffected.
A file with only the Hidden attribute is revealed when you enable Show hidden items. A file with the System attribute is revealed only when you also enable Show protected operating system files, which is a separate setting buried in Folder Options.
Did you know?
The Hidden, System, Read-only, and Archive attributes date back to MS-DOS in the 1980s. They are still present in modern Windows for backward compatibility. NTFS adds additional attributes such as Encrypted and Compressed, but Hidden remains the primary visibility control.
Other file attributes
Beyond the four classic MS-DOS attributes, NTFS supports additional attributes that may appear in cohort modders' file management:
- Compressed (C) — File is stored compressed on disk; transparently decompressed on read.
- Encrypted (E) — File is encrypted with the Encrypting File System (EFS).
- Not content indexed (I) — File is excluded from the Windows search index.
- Offline (O) — File is stored on offline storage (typically OneDrive Files On-Demand).
- Sparse (P) — File has sparse regions stored efficiently.
- Temporary (T) — File is marked as temporary; Windows may treat it differently for caching.
- Reparse point (L) — File is a symbolic link or junction.
Cohort modders most often encounter Compressed, Offline, and Reparse point attributes in addition to Hidden and System. Each attribute has specific implications for file behavior, but only Hidden and System affect File Explorer visibility.
Best practice
Inspect file attributes through right-click → Properties when troubleshooting unexpected file behavior. The General tab shows Read-only and Hidden checkboxes; the Advanced button shows the full attribute set including Compressed, Encrypted, and indexing-related flags.
Enabling hidden files on Windows 11
Windows 11 places the Hidden items toggle in the same submenu as the File name extensions toggle covered in the previous article.
- Open File Explorer.
- Click the View button in the command bar.
- Hover over Show.
- Click Hidden items in the submenu.
A check mark appears next to Hidden items when the setting is enabled. Hidden files and folders immediately appear in every File Explorer window. They display with slightly faded icons to indicate the Hidden attribute is still set.

Pro tip
If you skipped enabling file extensions earlier, do both at the same time now. The two settings live next to each other in the same submenu, and you need both for productive mod work.
The Windows 11 toggle stores its state in the registry at HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden. The value 1 shows hidden items; the value 2 hides them. (The value naming is historical and counterintuitive; cohort modders sometimes script the configuration through the registry and should be aware that 1 means show, not hide.)
Did you know?
The "Hidden" registry value's encoding (1 for show, 2 for hide) is documented in the Microsoft Windows Registry reference. The encoding dates from early Windows versions and was preserved for backward compatibility. The counterintuitive ordering is a frequent source of confusion when cohort modders write registry-based configuration scripts.
Enabling hidden files on Windows 10
Windows 10 places the setting in the View ribbon tab.
- Open File Explorer.
- Click the View tab in the ribbon at the top.
- Look at the Show/hide group on the right side of the ribbon.
- Click the Hidden items checkbox.
The setting takes effect immediately. Hidden files appear with faded icons throughout File Explorer.
For more granular control, open Folder Options:
- Open File Explorer.
- Click File, then Change folder and search options.
- Click the View tab in the Folder Options dialog.
- Scroll to Hidden files and folders.
- Choose Show hidden files, folders, and drives.
- To also reveal system files, uncheck Hide protected operating system files (Recommended).
- Click Apply, then OK.
Common mistake
Unchecking Hide protected operating system files is rarely necessary for mod development and can be dangerous. The warning dialog that appears is genuine; system files exposed by this setting are critical to Windows operation and should not be modified casually.
The Folder Options dialog provides several additional visibility-related settings that cohort modders may want to configure on a fresh installation:
- Display the full path in the title bar (Windows 10) — show the complete path of the current folder in the title bar.
- Hide empty drives — affects whether This PC shows drive letters with no media inserted.
- Hide extensions for known file types — the file extension toggle covered in the previous article.
- Launch folder windows in a separate process — improves stability when one folder crashes; uses slightly more memory.
- Show pop-up description for folder and desktop items — controls tooltip display.
Cohort modders typically configure the dialog once on a fresh workstation and rarely revisit it afterwards. The settings persist across reboots and Windows updates.
Hidden vs System: a critical distinction
The two attributes overlap in some files but mean different things. Understanding the distinction prevents accidental damage to your Windows installation.
| Attribute | Set on what | Why it is hidden | Risk if modified |
|---|---|---|---|
| Hidden only | User config, AppData subfolders, browser caches | Reduce clutter for typical users | Low to medium; can usually be regenerated |
| System only | Pagefile.sys, hiberfil.sys, swapfile.sys | Critical OS files at the drive root | High; deletion can prevent boot |
| Hidden + System | Some OS configuration folders | Critical and rarely accessed | High; deletion can break OS subsystems |
| Neither | Documents, downloads, mod project files | Normal files for everyday use | None from visibility alone |
The visual cue in File Explorer is consistent: any file with the Hidden attribute appears faded. There is no separate visual indicator for System files; the only way to know is to check the attributes through right-click → Properties or through the attrib command in PowerShell.
Best practice
Enable Show hidden items but leave Hide protected operating system files at its default. This gives you access to all the user-level folders you need for mod work while protecting Windows itself.
The attrib command
PowerShell and Command Prompt both support the attrib command for reading and modifying file attributes. The command's syntax:
attrib [+/-attribute] [filename]Where attribute is one of R (read-only), H (hidden), S (system), or A (archive). The + flag sets the attribute; the - flag clears it.
Examples:
attrib file.txt— display the attributes offile.txt.attrib +h file.txt— set the Hidden attribute onfile.txt.attrib -h file.txt— clear the Hidden attribute onfile.txt.attrib +s +h file.txt— set both Hidden and System.attrib -s -h file.txt— clear both.
The attrib command is the cohort-recommended tool for bulk attribute modifications. PowerShell's Set-ItemProperty provides equivalent functionality through the Attributes property of file objects.
Pro tip
To inspect the attributes of every file in a folder, run attrib * in PowerShell from that folder. The output lists each file with its current attribute flags, providing a quick audit of which files are hidden, system, or read-only.
Hidden folders modders visit constantly
Several folders relevant to Unturned™ mod development are hidden by default. You cannot reach them without first enabling hidden items.
| Folder path | Contains | Why modders care |
|---|---|---|
C:\Users\YourName\AppData | Application data root | Parent of all user-level config |
%AppData% (AppData\Roaming) | Per-user app settings | Sync-friendly config |
%LocalAppData% (AppData\Local) | Per-machine app cache | Larger, machine-specific data |
C:\ProgramData | All-users app data | Shared config and licenses |
%LocalAppData%\Unity\cache | Unity Editor cache | When debugging Unity build issues |
%AppData%\Unturned | Some Unturned user data | Saved configuration |
%LocalAppData%\Unturned\Logs | Unturned log output | Debugging mod loading issues |
%AppData%\Steam | Some Steam configuration | Account-specific settings |
C:\Users\YourName\
├── AppData\ (hidden)
│ ├── Local\ (large cached data)
│ ├── LocalLow\ (low-trust apps)
│ └── Roaming\ (sync-friendly config)
├── Desktop\
├── Documents\
└── Downloads\To reach AppData quickly without enabling hidden items, type %AppData% into the address bar. Windows resolves the environment variable and opens the folder even when the parent AppData is hidden. This trick is useful on borrowed computers where you do not want to change settings.
AppData subfolder distinctions
The three AppData subfolders (Roaming, Local, LocalLow) serve different purposes and should not be confused:
- Roaming (
%AppData%): per-user settings designed to roam with the user across machines via Active Directory or OneDrive sync. Typically holds small configuration files. - Local (
%LocalAppData%): per-user, per-machine data that does not roam. Typically holds caches, larger application state, and machine-specific configuration. - LocalLow: per-user, per-machine data for low-integrity processes (typically sandboxed applications and older Internet Explorer). Cohort modders rarely interact with LocalLow directly.
Cohort modders should know which subfolder a given application uses. Unturned™ stores most of its user data in Roaming, but a few caches and logs land in Local. Steam splits its configuration similarly across the two.
Did you know?
The Roaming/Local distinction was introduced in Windows Vista as part of the redesigned user-profile structure. Earlier Windows versions used a single Application Data folder that did not distinguish between roaming and machine-local data. The Vista redesign supported better roaming-profile behavior in enterprise Active Directory environments.
Decision flowchart: should I show this category?
How to hide or unhide a specific file
You can manually set or clear the Hidden attribute on individual files when you need to clean up a folder or expose a previously hidden file.
- Right-click the file or folder.
- Choose Properties.
- On the General tab, look at the Attributes row at the bottom.
- Check or uncheck the Hidden checkbox.
- Click Apply.
For folders, Windows asks whether to apply the change to the folder only or to all files and subfolders within it. Choose the option that matches your intent.
Common mistake
A modder unhides a folder to inspect it, then forgets to re-hide it after. The folder remains visible and clutters Quick Access and the parent directory. If you only need temporary visibility, use the global Show hidden items toggle rather than changing individual file attributes.
Bulk attribute changes via PowerShell
For bulk changes affecting many files at once, PowerShell is more efficient than per-file Properties dialogs:
powershell
# Hide all files in current folder
Get-ChildItem -Force | ForEach-Object { $_.Attributes = $_.Attributes -bor 'Hidden' }
# Unhide all files in current folder
Get-ChildItem -Force -Attributes Hidden | ForEach-Object { $_.Attributes = $_.Attributes -band -bnot 'Hidden' }
# List all hidden files recursively
Get-ChildItem -Force -Attributes Hidden -RecurseThe PowerShell approach is the cohort-recommended method when working with directories that contain hundreds or thousands of files. The performance difference is significant: bulk PowerShell operations complete in seconds, while equivalent click-through Properties operations would take minutes or hours.
Best practice
When scripting hidden-attribute changes, always test on a copy of the target folder first. The Hidden attribute itself is reversible, but a misapplied script that hides hundreds of files makes recovery tedious. A test run on a copy reveals any unexpected behavior before it affects production data.
Frequently asked questions
Why do hidden files appear faded when revealed?
The fade is a visual reminder that the file still has the Hidden attribute set. You are seeing it because the global setting is enabled, not because the attribute was cleared. This prevents you from forgetting and treating a hidden file as normal.
Can I hide my own files to keep them private?
Setting the Hidden attribute does not provide privacy. Anyone who enables Show hidden items can see the file. For real privacy, use NTFS permissions or full-disk encryption. Hidden is for visual organization, not security.
Why is %AppData% hidden by default?
Windows hides AppData to discourage casual users from modifying application configuration directly. Most applications expose their important settings through their own user interface, so the user rarely needs to visit AppData. Modders are the exception because they must inspect or modify configuration that applications do not expose.
Does showing hidden items slow down File Explorer?
There is no measurable performance impact. The hidden files exist on disk regardless of whether they are displayed; the only difference is whether File Explorer filters them from the view.
Can I hide a file without setting the Hidden attribute?
Yes. NTFS Access Control Lists (ACLs) can deny read permission to specific users, making the file effectively invisible to those users. ACLs are heavier than the Hidden attribute but provide real access control. For cohort modders, ACLs are rarely necessary; the Hidden attribute serves the visual organization purpose without security implications.
Why do some hidden folders show in some File Explorer windows but not others?
Folder view settings are applied per-folder. If a specific folder has a custom view that hides hidden items, the global setting may be overridden for that folder. Reset the per-folder view through Folder Options → View → Reset Folders.
How do I tell if a file has the System attribute set?
Use attrib filename in PowerShell. The output includes an S flag if the System attribute is set. Alternatively, right-click → Properties → Advanced shows a more detailed attribute view.
Can I see hidden files in PowerShell?
Yes. The Get-ChildItem cmdlet shows non-hidden files by default. Add the -Force flag to include hidden and system files: Get-ChildItem -Force. The Force flag is the PowerShell equivalent of File Explorer's Show hidden items toggle.
Do hidden folders behave differently from normal folders?
No. The Hidden attribute only affects display in File Explorer (and other applications that respect the attribute). The folder itself behaves identically: files can be created, modified, deleted, and read just as in any other folder.
Why does enabling hidden items reveal so many files in my user folder?
Application caches, browser data, OneDrive metadata, and various Windows-managed files all land in your user folder with the Hidden attribute. The default-hidden state keeps the folder visually manageable for typical users. With hidden items enabled, you see the full set, which can number in the dozens of files and folders.
Can I configure hidden item display through Group Policy?
Yes. The relevant Group Policy is at User Configuration → Administrative Templates → Windows Components → File Explorer → Hidden Files and Folders. Group Policy can force-show or force-hide hidden items regardless of user preference.
What is the difference between Hidden and Stealth on macOS?
macOS uses two parallel mechanisms: a "hidden" flag on files (similar to Windows Hidden attribute) and a leading-dot naming convention (.filename) that hides files in Finder. Windows does not honor the leading-dot convention; a file named .gitignore is fully visible in File Explorer regardless of the Hidden attribute. Cohort modders working across Windows and macOS should know this difference.
Why does the Hidden checkbox in Properties grey out for some files?
The checkbox greys out when the file's attributes are controlled by the file system (such as for some system files) or when the current user lacks permission to modify the file's attributes. In both cases, the file's hidden state is fixed and cannot be changed through the Properties dialog.
Best practices
- Enable Show hidden items on every Windows installation immediately after enabling file extensions.
- Leave Hide protected operating system files at its default. Show system files only when actively debugging Windows.
- Use the
%AppData%,%LocalAppData%, and%ProgramData%environment variables in the address bar for fast access without changing visibility settings. - Never manually clear the Hidden attribute on system folders. The global toggle is the right tool for visibility.
- Test bulk attribute scripts on copies before running on original data.
- Configure hidden items through Group Policy when managing multiple workstations centrally.
- Use PowerShell's
-Forceflag in scripts that need to enumerate all files including hidden ones. - Document hidden-folder paths in your project's onboarding materials so new contributors can find them.
- Distinguish AppData\Roaming, AppData\Local, and AppData\LocalLow when troubleshooting application configuration.
Appendix A: hidden folder reference for cohort modders
The following table documents the hidden folders cohort modders visit most often during Unturned mod development. Cohort modders should be able to recall the purpose of each folder from memory.
User-profile hidden folders
| Folder | Path | Purpose |
|---|---|---|
| AppData root | C:\Users\YourName\AppData | Parent of all per-user app data |
| Roaming | %AppData% | Sync-friendly per-user config |
| Local | %LocalAppData% | Per-machine per-user cache |
| LocalLow | %LocalAppData%Low | Low-integrity app data |
| Temp | %Temp% | Per-user temporary files |
| Recent | %AppData%\Microsoft\Windows\Recent | Recently-accessed file shortcuts |
| Cookies | %LocalAppData%\Microsoft\Windows\INetCookies | Browser cookies |
| Cache | %LocalAppData%\Microsoft\Windows\INetCache | Browser cache |
Game and Steam hidden folders
| Folder | Path | Purpose |
|---|---|---|
| Unturned user data | %AppData%\Unturned | Per-user Unturned configuration |
| Unturned logs | %LocalAppData%\Unturned\Logs | Unturned log output |
| Steam config | %AppData%\Steam | Steam client configuration |
| Steam cloud saves | %ProgramFiles(x86)%\Steam\userdata | Steam cloud-synced save data |
Unity Editor hidden folders
| Folder | Path | Purpose |
|---|---|---|
| Unity Hub | %AppData%\UnityHub | Unity Hub configuration |
| Unity cache | %LocalAppData%\Unity\cache | Unity Editor asset cache |
| Unity logs | %LocalAppData%\Unity\Editor | Unity Editor log output |
Windows hidden folders
| Folder | Path | Purpose |
|---|---|---|
| ProgramData | C:\ProgramData | All-users app data |
| WindowsApps | C:\Program Files\WindowsApps | Microsoft Store apps |
| System Volume Information | C:\System Volume Information | Restore point data |
| Recycle Bin | C:\$Recycle.Bin | Per-user trash storage |
Appendix B: troubleshooting hidden-file issues
The following table documents the most common hidden-file problems and their resolutions.
| Symptom | Likely cause | Resolution |
|---|---|---|
| Hidden items toggle has no effect | Per-folder view override | Reset folder views: Options → View → Reset Folders |
| Files appear hidden in some windows but not others | Inconsistent per-folder view | Same as above |
| Cannot uncheck Hidden in Properties | Permission denied | Run File Explorer as administrator |
| Hidden attribute reappears after clearing | Application sets the attribute on save | Identify the application; report bug or work around |
%AppData% opens empty folder | Variable expansion failed | Check spelling; restart shell if recently set |
| Hidden folder shows in This PC but not in navigation pane | Pane filter setting | Right-click pane → Show all folders |
| Cannot delete hidden file | File in use | Close the application that has the file open |
| System attribute cannot be cleared | Permission or anti-tamper protection | Use attrib -s with elevated PowerShell; verify legitimacy |
File appears in attrib output but not in File Explorer | View filter set | Toggle Hidden items |
| Group Policy forces hidden items off | Enterprise management | Cannot override locally; contact administrator |
Appendix C: registry and PowerShell reference
For cohort modders who manage workstations through scripting, the following registry and PowerShell snippets control hidden-file display.
Registry values
| Path | Value name | Type | Setting |
|---|---|---|---|
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Hidden | DWORD | 1 to show, 2 to hide |
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | ShowSuperHidden | DWORD | 1 to show system files, 0 to hide |
PowerShell to enable hidden items
powershell
# Show hidden items
Set-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced' -Name 'Hidden' -Value 1
# Show system files (use with caution)
Set-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced' -Name 'ShowSuperHidden' -Value 1
# Restart File Explorer to apply
Stop-Process -Name explorer -Force
Start-Process explorer.exePowerShell to enumerate hidden files
powershell
# Hidden files in current folder
Get-ChildItem -Force -Attributes Hidden
# Hidden files recursively
Get-ChildItem -Force -Attributes Hidden -Recurse
# Hidden directories only
Get-ChildItem -Force -Attributes Hidden -Directory
# Hidden files with specific extension
Get-ChildItem -Force -Attributes Hidden -Filter *.jsonGroup Policy
- Path: User Configuration → Administrative Templates → Windows Components → File Explorer
- Policy: "Hidden Files and Folders"
- States: Show, Hide
Best practice
Maintain a cohort onboarding script that configures hidden items along with file extensions, default applications, and other Windows preferences. The script runs once on a fresh workstation and produces a uniform, productive environment in minutes.
Appendix D: visibility configurations across cohort workstations
The cohort has documented the visibility configuration used by experienced modders. The configuration is uniform across the cohort:
The dominant configuration (Hidden items shown, system files hidden) reflects the cohort recommendation: visibility into AppData and other hidden parents, while leaving Windows system files protected from accidental view and modification. The small fraction with system files shown typically consists of modders actively debugging Windows itself or developing low-level utilities.
Did you know?
The cohort's visibility-configuration audit (conducted annually since 2022) consistently shows the 94 percent figure for the recommended configuration. The figure has remained stable across audit years, suggesting that cohort modders converge on the same visibility configuration regardless of when they joined.
Appendix E: hidden-file behavior in third-party file managers
The Hidden attribute is a Windows-level metadata flag that any application can choose to respect or ignore. Cohort modders who use alternative file managers should know how each handles hidden files.
Files App
Files App respects the Hidden attribute and honors a per-application toggle for hidden item display. The toggle is in the View menu, similar to File Explorer. Cohort modders who switch between File Explorer and Files App should configure both to show hidden items for consistency.
Total Commander
Total Commander shows hidden files by default. The application's configuration (Configuration → Options → Display → "Show hidden/system files") controls the behavior. Cohort modders using Total Commander typically leave the default enabled.
Directory Opus
Directory Opus has separate toggles for Hidden, System, and "files with extension .bak" or other patterns. The granularity supports highly customized visibility. Cohort modders using Directory Opus typically configure visibility per-folder rather than globally.
7-Zip File Manager
7-Zip File Manager shows hidden files by default. The application is used primarily for archive navigation, where the Hidden attribute applies to the archive members and Windows files visible during extraction.
Command-line tools
PowerShell's Get-ChildItem (and its alias ls and dir) requires the -Force flag to show hidden files. The legacy Command Prompt dir command requires /a:h to show hidden files specifically, or /a to show all files regardless of attributes.
Robocopy, the Windows file-copy utility, copies hidden files by default unless explicitly excluded with /XA:H. Cohort modders who use Robocopy for backup or deployment should know this behavior to avoid unexpectedly copying hidden caches alongside intended source files.
Best practice
When choosing tools for mod-development workflows, prefer tools that respect the Hidden attribute consistently. Tools that ignore the attribute entirely (showing all files regardless) can be useful in specific contexts but require additional caution to avoid acting on Windows-managed files.
Appendix F: visibility and security
The Hidden attribute is widely misunderstood as a security feature. It is not. Cohort modders should know the precise security boundaries of the attribute.
What the Hidden attribute does
The Hidden attribute is a metadata flag that File Explorer (and other respecting applications) use to filter the default file list. It is purely visual. It does not change:
- The file's access permissions
- The file's encryption status
- The file's existence in directory enumerations from other applications
- The file's accessibility via direct path access
What the Hidden attribute does not do
The Hidden attribute does not:
- Prevent any user from reading the file
- Prevent any application from opening the file
- Prevent searches and indexers from including the file
- Prevent backup tools from copying the file
- Prevent malware scanners from inspecting the file
- Provide any meaningful privacy or security
When to use NTFS permissions instead
For real access control, use NTFS Access Control Lists (ACLs):
- Right-click the file or folder → Properties → Security tab.
- Click Edit, then Add or modify the user/group entries.
- Set the desired permissions (Read, Write, Execute, etc.).
- Click Apply.
ACLs provide enforced access control: a user without read permission cannot read the file, regardless of any visibility setting. Cohort modders working with sensitive project data should use ACLs, not the Hidden attribute, for protection.
When to use full-disk encryption
For maximum protection against unauthorized access to a workstation's data, enable BitLocker (Windows Pro and Enterprise) or device encryption (Windows Home). Encryption is independent of file visibility and applies even when the workstation is powered off and the drive is physically removed.
Common mistake
Treating the Hidden attribute as a security feature. The attribute is a visual convenience, not a protective measure. Anyone with file-system access can see and read hidden files trivially. For real protection, use ACLs or encryption.
Appendix G: cohort onboarding script — hidden items section
The cohort's reference onboarding script for new modders' fresh Windows workstations includes hidden-items configuration as part of its visibility-configuration section. The relevant script section:
powershell
# Enable hidden items
Set-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced' -Name 'Hidden' -Value 1
# Confirm the change
$current = Get-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced' -Name 'Hidden'
if ($current.Hidden -eq 1) {
Write-Output "Hidden items enabled."
} else {
Write-Warning "Failed to enable hidden items."
}
# Restart File Explorer to apply
Stop-Process -Name explorer -Force
Start-Process explorer.exeThe script sets the registry value, verifies the change, and restarts File Explorer to apply. The verification step is the cohort-recommended pattern for any configuration script: don't trust that the change took effect; verify it explicitly.
Best practice
Cohort onboarding scripts should always include verification steps after each configuration change. The verification adds a few lines of script but prevents the silent-failure scenario where a registry change does not actually take effect and the modder discovers the gap days later.
Appendix H: long-form discussion of visibility philosophy
Windows' hidden-file behavior reflects a philosophical choice that has produced operational consequences for thirty years. Understanding the choice helps cohort modders configure their workstations confidently.
The Windows philosophy
Windows is designed for a broad audience that includes novice users with no technical training. The default visibility settings prioritize protection over flexibility: hide everything that a typical user does not need to see, so that accidental modifications cannot break the system.
This philosophy produces a coherent default behavior for typical users: Documents, Downloads, and the desktop contain the user's files; everything else is hidden by default. Users who never need to access AppData, ProgramData, or system files can run Windows productively without ever encountering these locations.
The technical-user trade-off
The trade-off is that technical users (cohort modders included) must reverse the defaults to expose the file system fully. The reversal is one-time per user account and takes seconds, but the necessity of the reversal is sometimes cited as a friction point.
Microsoft has not changed the defaults despite repeated feedback because:
- Changing the defaults would surprise typical users.
- The configuration toggles are discoverable through View menus.
- The defaults are appropriate for the broadest user base.
Cohort modders accept the trade-off and treat the visibility configuration as a standard part of Windows onboarding.
Alternative philosophies
Other operating systems take different positions:
- macOS: hides files with the Hidden flag and files with leading-dot names; provides a toggle (Cmd + Shift + .) to reveal them.
- Linux: hides files with leading-dot names; provides a toggle (Ctrl + H in most file managers) to reveal them.
- iOS / Android: abstracts the file system away from users entirely.
The macOS and Linux approaches use the leading-dot convention as a developer-friendly hiding mechanism that doesn't require modifying file attributes. Cohort modders working cross-platform should know each platform's convention.
Implications for cohort workflow
The cohort recommendation across all platforms is to make visibility configuration a day-one onboarding step. The single configuration on Windows (Show hidden items), the single toggle on macOS (Cmd + Shift + .), and the single setting in Linux file managers all serve the same purpose: expose the file system to the developer's working tools.
Did you know?
The leading-dot hiding convention on Unix-derived systems dates from the original Unix implementation in the 1970s. The convention was unintentional: the implementation of the directory-listing utility skipped any filename starting with a dot because the directory contains entries . (current directory) and .. (parent directory) that should not appear in normal listings. The skip became a feature, and developers began using leading dots to hide configuration files. The convention persists fifty years later.
Document history
| Version | Date | Notes |
|---|---|---|
| 1.0 | 2024-09-10 | Initial publication. Windows 10 and Windows 11 paths documented. |
| 1.1 | 2024-11-22 | Added Hidden vs System distinction. Expanded hidden folders reference. |
| 1.2 | 2025-02-04 | Added per-file attribute modification section. Added decision flowchart for visibility settings. |
| 2.0 | 2025-03-22 | Major revision. Added bulk PowerShell operations, troubleshooting reference, and registry/Group Policy reference. |
| 2.1 | 2025-05-17 | Annual refresh. Added AppData subfolder distinctions, attrib command reference, and cohort visibility audit. |
Appendix I: case studies from cohort onboarding
The following case studies are drawn from documented cohort experience and illustrate the operational impact of the hidden-items configuration. Names are anonymized.
Case study 1: the first-week AppData discovery
A new cohort modder spent the first week of mod work attempting to find Unturned's user configuration folder. The modder tried searching, typing paths, and reading documentation. Each attempt failed because the AppData parent was hidden. After enabling hidden items at the start of week two, the modder reached the AppData folder in seconds.
The case is one of the most-cited examples in the cohort's onboarding materials. The four hours the modder lost to the visibility gap could have been saved by a fifteen-second configuration change on day one.
Case study 2: the cross-machine sync surprise
A cohort modder maintained two workstations and configured both identically by hand. The modder noticed that one workstation showed hidden files while the other did not. The cause was a single missed configuration step on the second workstation. After running the cohort onboarding script (which configures both visibility settings in one execution) on the second workstation, the two workstations became uniform.
The case led the cohort to formalize the onboarding script as a documented artifact rather than an oral-tradition collection of registry edits.
Case study 3: the team workstation handover
A cohort team transferred a workstation between two team members. The receiving member found that hidden items were enabled (good) but that the second member's file-system understanding assumed hidden items were not visible. The mismatch produced several days of confusion before the team explicitly discussed the visibility configuration.
The case led to a cohort recommendation that team workstations should be configured to a uniform visibility standard, documented in the workstation's onboarding notes, and verified at handover time.
Case study 4: the inherited project tree
A modder inherited a multi-year mod project from a retired cohort member. The project tree contained several hidden folders that the new modder did not initially see, leading to incomplete builds. After enabling hidden items and re-running the project's build script, the hidden folders contributed correctly and the build completed successfully.
The case reinforced the cohort recommendation that hidden items should be visible on every cohort workstation regardless of personal preference, so that inherited projects work consistently.
Case study 5: the OneDrive sync gap
A modder used OneDrive to sync project files between workstations. The modder noticed that some files were not appearing on the receiving workstation. The cause was that OneDrive does not sync files with the System attribute by default. After clearing the System attribute on the affected files (which had picked it up through a misconfigured backup tool), the sync completed correctly.
The case taught the cohort to inspect file attributes when investigating sync gaps. The Hidden attribute alone does not block OneDrive sync, but the System attribute does.
Cross-references
- How to Open File Explorer — the prerequisite skill for accessing the View menu.
- How to Navigate to a Folder — the navigation foundation; environment variables (
%AppData%, etc.) covered here are the primary way to reach hidden folders. - How to View File Extensions — the configuration typically performed at the same time as enabling hidden items.
Next steps
With File Explorer now configured to show extensions and hidden items, you are ready to learn the core file operations. Continue to How to Copy a File to learn the four methods of copying files in Windows.
Enabling hidden file display is the second of two configuration changes every cohort modder makes on every fresh Windows installation. Combined with the extension display configured in the previous article, these two settings expose the full file system to the modder's working tools. The configuration takes approximately thirty seconds total for both settings and pays back in productive access to AppData, ProgramData, and other hidden parents for the lifetime of the workstation.
Did you know?
The cohort's documented "configuration adherence rate" across new modders is approximately 87 percent for the extension toggle and 79 percent for the hidden items toggle in the first week. The hidden items toggle is the slightly less-adopted of the two because the immediate benefit (visibility into AppData) is less obvious to a new modder than the extension benefit (file identification). Cohort onboarding materials emphasize the hidden items toggle as deliberately as the extension toggle.
Pro tip
After enabling both settings, navigate to C:\Users\YourName and observe the new files and folders that have appeared. The visible AppData folder is the most operationally important addition; the small Hidden-attribute files at the user-profile root (such as NTUSER.DAT) are Windows-managed and should be left alone.
Best practice
Add the hidden items configuration step to the same fresh-install checklist that includes the extension configuration step. The two settings together form the cohort's standard visibility configuration. Cohort modders who treat the pair as a unit rarely forget either, while modders who treat them separately sometimes forget the hidden items toggle and lose access to AppData for days or weeks until they notice the gap.
Pro tip
After enabling hidden items, pin the AppData root and ProgramData root to Quick Access. Both are useful enough to warrant permanent navigation-pane visibility, and pinning them surfaces their location even when the user does not remember the environment variable names. Cohort modders who pin both report fewer accidental visits to wrong locations during configuration debugging.
Did you know?
The cohort's onboarding-script library includes a verification step that opens File Explorer at C:\Users\$env:USERNAME and confirms that the AppData folder is visible. The verification is the cohort-recommended last step of any visibility-configuration session because it confirms operationally that the configuration took effect, not just that the registry was updated.
Common mistake
Enabling hidden items but forgetting to enable extensions, or vice versa. The two settings serve related but distinct purposes, and both are needed for productive mod work. Cohort modders who treat them as separate decisions sometimes enable one and forget the other; the cohort recommendation is to treat them as a single configuration pair.
Best practice
Maintain a written record of every visibility-related decision you make on each workstation, including the date the configuration was applied and the verification step that confirmed it. The written record supports later troubleshooting and supports the cohort's documented preference for verifiable, repeatable configuration across multiple workstations.
Pro tip
Cohort modders who work on multiple Windows installations (such as a primary workstation and a virtual machine for testing) should run the same visibility-configuration script on every installation. The uniformity supports parallel development without surprise: a hidden file on one installation is also visible on the other, and a configuration that works in one place works identically in the other.
Did you know?
The cohort's documented "configuration-induced bug count" has decreased by approximately 60 percent since the cohort formalized the visibility-configuration step in its onboarding script. Before formalization, bugs caused by missing or inconsistent visibility configurations were one of the top three new-modder bug categories. After formalization, the category dropped out of the top ten.
