Peony LogoPeony

How to Password Protect Files on Windows (BitLocker Isn't Enough) in 2026

Deqian Jia
Deqian Jia

Founder at Peony — building AI-powered data rooms for secure deal workflows.

Connect with me on LinkedIn! I want to help you :)

Last updated: March 2026

If you are here, you are probably not trying to hide a desktop shortcut.

You are thinking about real files — financial models, contracts, client data, HR documents, board decks — on a Windows PC that would cause genuine damage if they leaked. I run Peony (a data room company), so I test file protection on every major platform. Half my team works on Windows, and this is the setup I put on every one of their machines: BitLocker for full-disk encryption, 7-Zip for anything that needs archiving, and Peony for every file that leaves the PC.

TL;DR — Windows has solid built-in encryption: BitLocker for full-disk (Pro/Enterprise), EFS for file-level, Office encryption for documents, and 7-Zip for AES-256 archives. All free. But none give you any visibility or control after you share a file — no tracking, no revocation, no watermarking. The IBM 2025 Cost of a Data Breach Report puts credential-related breaches at $4.67 million on average, Verizon's 2025 DBIR found ~60% of breaches involve the human element, and the average breach takes 241 days to identify. If your files leave your Windows PC, a password alone is not enough.

Password protecting files on Windows means encrypting or restricting access so that only authorized people can open your content. Windows offers multiple layers of encryption — BitLocker uses AES in XTS mode for full-disk encryption, EFS provides file-level protection tied to your user account, and tools like 7-Zip offer AES-256 for portable archives.

But here is the gap that every Windows user hits: all of these methods protect files at rest on your PC. The moment you attach a file to an Outlook email, drop it in a Teams chat, or upload it to a shared OneDrive folder, you lose all control — see our secure file sharing guide for the full picture. That is why I split my workflow into "local protection" (Windows built-in tools) and "sharing protection" (Peonyidentity-bound access, password gating, page-level analytics, and one-click revocation).

This guide covers all five methods so you can pick what fits your situation. (On a Mac instead? See our Mac file protection guide.)

Quick Guide: 5 Methods Compared

MethodCostProtectsTrackingRevocationBest For
BitLockerFree (Pro/Enterprise)Entire diskNoNoBaseline for every Windows Pro PC
EFS (Encrypted File System)Free (Pro/Enterprise)Files/foldersNoNoSensitive local files
Office Built-In EncryptionFree with OfficeOffice documentsNoNoQuick single-file protection
7-Zip AES-256 ArchivesFree (any edition)File bundlesNoNoCross-platform file delivery
Peony (secure sharing)FreeShared filesPer-viewer, per-pageYesClient files, investor decks, HR docs

Method 1 — BitLocker (Full-Disk Encryption)

BitLocker is Windows' answer to macOS FileVault — it encrypts your entire drive so that if your laptop is lost or stolen, the data cannot be read without authentication.

How to enable BitLocker

  1. Open Settings then Privacy & security then Device encryption (Windows 11) or search for "Manage BitLocker" in the Start menu.
  2. Click Turn on BitLocker for each drive you want to protect.
  3. Choose how to back up your recovery key: Microsoft account, USB flash drive, file, or print.
  4. Choose encryption mode: XTS-AES for internal drives (recommended), AES-CBC for removable drives that need cross-device compatibility.
  5. Encryption runs in the background — your PC stays usable.

Important edition note: Full BitLocker with Group Policy controls is available on Windows Pro, Enterprise, and Education editions. Windows 11 Home includes Device Encryption on supported hardware (requires TPM 2.0 and UEFI Secure Boot), which provides similar drive-level encryption but without BitLocker's advanced management options. Starting with Windows 11 24H2, Device Encryption is enabled by default on clean installs with a Microsoft Account — both Home and Pro.

I enabled BitLocker on my work laptop the day I started handling client data. The performance impact on modern SSDs with hardware AES acceleration is negligible — I have never noticed a slowdown.

Pros

  • Ships with Windows Pro and Enterprise, no downloads needed
  • Uses AES-128 or AES-256 in XTS mode, the standard NIST recommends for disk encryption
  • TPM 2.0 integration on modern PCs stores encryption keys in dedicated hardware
  • Protects against physical theft, lost devices, and unauthorized disk removal
  • Encrypts external USB drives with BitLocker To Go

Cons

  • Not available on Windows Home (only Device Encryption, which is less configurable)
  • Protects data at rest only — does nothing for files you share
  • Recovery key management is critical — if you lose the key and forget your password, data is unrecoverable
  • No per-file granularity (entire drive or nothing)

Best for

Every Windows Pro/Enterprise PC with sensitive data. This is baseline security, not optional.

Method 2 — EFS (File and Folder-Level Encryption)

When BitLocker covers the whole disk but you want encryption on specific files or folders — visible only to your Windows user account — EFS (Encrypting File System) is the built-in answer.

How to encrypt files with EFS

  1. Right-click the file or folder you want to encrypt.
  2. Select Properties then click Advanced.
  3. Check Encrypt contents to secure data and click OK.
  4. Choose whether to encrypt just the file or the parent folder and all contents.
  5. Back up your EFS certificate immediately (search for "Manage file encryption certificates" in the Start menu). If your Windows account is lost or reset without the certificate backup, the encrypted files are unrecoverable.

The encrypted files appear normal to you when logged into your account. Other users on the same PC — or anyone who removes the hard drive — see them as inaccessible.

I use EFS for a "Confidential" folder on my work PC that contains client financial models and internal strategy documents. Even if IT accesses the machine for maintenance, those files stay encrypted to my account.

Pros

  • Built into Windows Pro, Enterprise, and Education — no third-party software
  • Granular: encrypt individual files or specific folders, not the whole disk
  • Transparent to the encrypting user — files open normally when you are logged in
  • Combines with BitLocker for defense in depth (disk-level + file-level)

Cons

  • Not available on Windows Home — this is the biggest limitation
  • Tied to your Windows user account — if the account is reset without a certificate backup, files are permanently lost
  • No access tracking, no revocation, no watermarking after sharing
  • If you copy an EFS-encrypted file to a USB drive or email it, the encryption is typically stripped — the file arrives unprotected

Best for

Sensitive local files on shared PCs (multi-user machines, laptops that IT manages) where you need file-level isolation beyond BitLocker's drive-level protection. Windows Pro/Enterprise only.

Method 3 — Microsoft Office Built-In Encryption

For individual Word, Excel, or PowerPoint files, Microsoft Office includes built-in password protection — no extra software needed.

How to password protect an Office document

  1. Open the file in Word, Excel, or PowerPoint.
  2. Go to File then Info then Protect Document (or Protect Workbook / Protect Presentation).
  3. Click Encrypt with Password.
  4. Set a strong password and click OK.
  5. Save the file. It now requires the password to open.

Modern versions of Office (2016 and later) use AES-256 encryption — the same standard used by government agencies. The resulting file opens in any compatible version of Office across Windows, Mac, and mobile.

I used this for years before switching to Peony for anything I share externally. The breaking point came when I password-protected a financial model in Excel, emailed it to a potential acquirer, shared the password over Teams, and three months later discovered the file had been forwarded to two other parties I had never authorized. The Excel encryption was still intact — but the password traveled with it. See our guide to protecting Excel files for more.

Pros

  • Free with any Office installation or Microsoft 365 subscription
  • AES-256 encryption on modern Office versions
  • Cross-platform: protected files open on Windows, Mac, and mobile Office apps
  • Simple three-step process familiar to any Office user

Cons

  • One file at a time — no batch encryption
  • No tracking: you cannot see who opened the file or when
  • No revocation: once the password is shared, access is permanent
  • Password gets forwarded alongside the file in practice (Teams, Slack, email threads)
  • Only works for Office file formats (.docx, .xlsx, .pptx) — not PDFs, images, or other files

Best for

Quick protection for a single Office document you are storing locally or sharing with someone you fully trust.

Method 4 — 7-Zip AES-256 Encrypted Archives

To bundle multiple files into one password-protected package — especially for cross-platform delivery — 7-Zip is the standard free tool on Windows.

How to create an encrypted archive with 7-Zip

  1. Download and install 7-Zip (free, open source).
  2. Right-click the file(s) or folder you want to protect.
  3. Select 7-Zip then Add to archive.
  4. Choose Archive format: 7z (or ZIP if you need broader compatibility).
  5. Under Encryption, enter a strong password.
  6. Set Encryption method: AES-256.
  7. Check Encrypt file names (7z format only — hides even the file names inside the archive).
  8. Click OK.

The resulting .7z file is encrypted with AES-256 and can be opened on any platform with 7-Zip or compatible tools (WinRAR, PeaZip, Keka on Mac).

Note on Windows' built-in ZIP: Windows Explorer can create ZIP files natively, but it does not support password protection or encryption. You must use 7-Zip or a similar tool. See our complete guide to password protecting ZIP files for detailed instructions.

Pros

  • Free and open source — works on any Windows edition including Home
  • AES-256 encryption (the strongest widely available standard)
  • "Encrypt file names" option hides the contents list, not just the file data
  • Cross-platform: recipients on Windows, Mac, or Linux can open the archive
  • Bundles multiple files and folders into one deliverable

Cons

  • Requires installing 7-Zip (Windows Explorer cannot create encrypted archives)
  • No tracking, no revocation, no watermarking
  • You must share the password through a separate channel
  • The recipient gets a full copy of all files — you cannot control what happens next

Best for

Cross-platform file delivery when the recipient specifically requests an encrypted archive and you accept the loss of control after sharing.

Method 5 — Peony (Secure Sharing With Tracking and Revocation)

The four methods above all protect files at rest on your Windows PC. They are solid for local security. But the moment you share a file — attach it in Outlook, drop it in Teams, upload it to a shared OneDrive folder — the protection model breaks.

Even OneDrive and SharePoint, which many Windows users rely on for sharing, fall short: you can restrict access to specific Microsoft accounts, but you get no per-viewer analytics (who actually opened the file versus who just received the link), no dynamic watermarking, no screenshot protection, and revoking access means manually removing permissions per file. There is no way to know if someone forwarded the link or downloaded and re-shared the file.

I built Peony to solve this exact gap. Think of it as your sharing perimeter: your Windows PC handles local encryption, and Peony handles everything that leaves your PC.

Honest note: Peony is a secure data room, not a local Windows encryption tool. It does not replace BitLocker or EFS. It replaces the part where you attach raw files to Outlook emails and hope nobody forwards them.

How to share files securely from your Windows PC with Peony

  1. Create a room in Peony — name it by context ("Series A Fundraise", "Client — Project Alpha", "HR Confidential").
  2. Upload files from your PC (PDFs, Excel, Word, PowerPoint, images, 7z archives — any format).
  3. Set access controls:
  4. Share one link via Outlook, Teams, Slack, or any channel. Recipients verify their identity and enter the passcode to view.
  5. Monitor access: page-level analytics show exactly who viewed each file, how long they spent on every page, and whether they returned.
  6. Revoke instantly: one click to shut down access for a specific viewer or the entire room.

If you update a file, replace it in Peony behind the same link. No more "Q1_Financials_v7_FINAL_realfinal.xlsx" in email threads.

Peony data room with Windows files organized for secure external sharing

What I actually see when someone views my files

This changed everything about how I share documents from my Windows PC. After uploading a board deck through Peony, I can see:

  • Which board member opened it, and when
  • How long they spent on each page (the strategic plan got 6 minutes, the appendix got 8 seconds — that tells me something)
  • Whether they came back for a second review before the meeting
  • Whether anyone attempted a screenshot (blocked and logged)

Before Peony, I was emailing encrypted Excel files from Outlook with the password in a separate Teams message. I had no idea who actually read the materials, who forwarded them, or whether anyone even opened the attachment before the meeting.

Peony analytics dashboard showing per-viewer access data for Windows-shared documents

Pricing

Peony has a free tier that covers most individual workflows. Pro is $33/month, Business is $40/month. Compare that to the cost of discovering three months later that your confidential financial model was forwarded to an unauthorized third party.

Peony pricing plans for secure Windows file sharing

Pros

Cons

  • Requires an internet connection (cloud-based sharing platform)
  • Not a local encryption tool — does not replace BitLocker or EFS for at-rest protection
  • File viewers see documents in Peony's secure viewer, not their native Windows app

Best for

Any file that leaves your Windows PC: investor decks, M&A documents, client deliverables, due diligence files, HR documents, real estate transaction files, LP reports, or anything where you need to know who accessed it and retain the ability to cut off access.

Method Comparison

FeatureBitLockerEFSOffice Encryption7-ZipPeony
CostFree (Pro/Enterprise)Free (Pro/Enterprise)Free with OfficeFreeFree
EncryptionAES-128/256 XTSAES-256AES-256AES-256AES-256 + TLS 1.3
ScopeFull diskFiles/foldersOffice files onlyFile bundlesShared files
Windows Home supportDevice Encryption onlyNoYesYesYes (browser)
Per-viewer trackingNoNoNoNoYes
Access revocationNoNoNoNoYes
Dynamic watermarksNoNoNoNoYes
Screenshot protectionNoNoNoNoYes
Works offlineYesYesYesYesNo
Protects after sharingNoNoNoNoYes

Bottom line: For local file protection on Windows, BitLocker plus EFS covers most scenarios — and they ship free with Pro/Enterprise. For Windows Home users, 7-Zip and Office encryption handle the basics. For files you share with anyone outside your PC, Peony is the only method here that gives you tracking, revocation, watermarking, and screenshot protection. The free tier handles most individual workflows.

By the Numbers

  • 72%+ of desktop PCs worldwide run Windows, making it the most-targeted operating system for data theft (StatCounter GlobalStats, 2025)
  • ~60% of data breaches involve the human element — weak passwords, misdelivery, bad access settings, credential theft (Verizon 2025 DBIR, analyzing 22,052 incidents across 139 countries)
  • 15 characters minimum — NIST SP 800-63B Revision 4 (August 2025) now mandates this for single-factor passwords, up from the old 8-character minimum (NIST SP 800-63B-4)
  • $4.67 million — average cost of a breach involving stolen or compromised credentials (IBM Cost of a Data Breach 2025)
  • 241 days — average time to identify and contain a data breach; organizations using AI and automation cut this by 80 days (IBM 2025)
  • 1 in 10 sensitive files is exposed to every employee in the average organization — 157,000 exposed records per company (Varonis 2025 State of Data Security Report)
  • AES-256 in XTS mode — the encryption standard available in BitLocker via Group Policy, recommended by NIST for disk encryption (Microsoft BitLocker documentation)
  • 22% of breaches start with stolen credentials as the initial access vector (Verizon 2025 DBIR)

Practical Tips

A few habits that put you ahead of most Windows users on security:

  • Stop attaching files to Outlook emails. This is the single biggest behavior change you can make. Every raw attachment you send is a file you can never take back — no tracking, no revocation, no idea who forwarded it. Instead, upload the file to Peony and share the link. You keep version control, access control, and full analytics. The recipient gets a clean viewing experience instead of a 25MB attachment that bounces.

  • Always enable BitLocker (or Device Encryption on Home). Microsoft strongly recommends BitLocker on every PC with sensitive data. On modern SSDs with hardware AES, the performance impact is negligible.

  • Back up your BitLocker recovery key AND your EFS certificate. Store recovery keys in your Microsoft account or a password manager — not on the same drive they protect. Export your EFS certificate immediately after enabling it. Without these backups, a Windows reinstall means permanent data loss.

  • Use long passphrases, not short clever passwords. NIST SP 800-63B-4 now mandates 15+ characters for single-factor authentication and explicitly says composition rules (uppercase, number, symbol) are no longer required. Use a password manager.

  • Never send file and password in the same channel. If you use Office encryption or 7-Zip, email the file but send the password over a different medium (SMS, phone call, Signal). Better yet, use Peony's identity-bound access so no password sharing is needed.

  • Separate "local safety" and "sharing safety" in your mind.

  • Encrypt USB drives with BitLocker To Go. If you must transfer files on a USB stick, right-click the drive in File Explorer and select "Turn on BitLocker." This encrypts the entire drive with a password.

Bottom Line

SituationWhat to do
Baseline PC securityTurn on BitLocker (Pro/Enterprise) or Device Encryption (Home)
Sensitive local files on shared PCsEnable EFS on specific folders (Pro/Enterprise only)
Quick single-document protectionUse Office built-in encryption (AES-256)
Cross-platform file deliveryUse 7-Zip with AES-256 encryption (avoid unencrypted ZIPs)
Any file you share externallyUse Peony — the only method with tracking, revocation, and watermarking (free tier available)
Investor decks and deal roomsUse Peony data rooms with NDA gating, analytics, and AI auto-indexing

You do not need to be a sysadmin to do this well. BitLocker for your disk, EFS for your most sensitive folders, and Peony for anything that leaves your PC. That is the whole system.

Frequently Asked Questions

How do you password protect files on Windows?

Windows has four built-in methods: BitLocker for full-disk encryption (Pro and Enterprise editions), EFS for file-level encryption, Microsoft Office built-in encryption for Word, Excel, and PowerPoint files, and 7-Zip for AES-256 encrypted archives. For files you share externally, Peony adds identity-bound access, password gating, page-level analytics, dynamic watermarks, and one-click revocation starting free.

Does Windows Home have file encryption?

Windows 11 Home includes Device Encryption on supported hardware (requires TPM 2.0 and UEFI Secure Boot), which encrypts the entire drive but does not offer the granular controls of BitLocker. Windows Home does not include EFS for file-level encryption. For password protecting individual files on Windows Home, use 7-Zip with AES-256 encryption or Microsoft Office built-in encryption. For secure sharing with tracking and revocation, Peony works on any Windows edition through the browser.

What encryption does BitLocker use?

BitLocker uses AES-128 or AES-256 encryption in XTS mode on internal drives and CBC mode on removable drives. Windows 11 defaults to AES-128 in XTS mode, but you can configure AES-256 via Group Policy. XTS mode is specifically designed for disk encryption and is recommended by NIST. Peony uses AES-256 encryption for documents at rest and TLS 1.3 in transit for anything you share from your Windows PC.

Can you see who opened a password-protected file on Windows?

No. BitLocker, EFS, Office encryption, and 7-Zip archives all provide zero visibility after sharing. Once you email the file and share the password, you cannot see who opened it, when they opened it, or whether they forwarded it. Peony provides page-level analytics showing exactly who accessed each file, how long they viewed every page, and whether they attempted screenshots.

How do I encrypt a USB drive on Windows?

Right-click the USB drive in File Explorer and select "Turn on BitLocker" (Windows Pro, Enterprise, and Education). Set a password, save the recovery key, and BitLocker To Go encrypts the entire drive. On Windows Home, BitLocker To Go is not available so you must use 7-Zip to create an AES-256 encrypted archive on the drive instead. For sharing files without a physical handoff, Peony lets you share a secure link with AI auto-indexing that organizes documents in under 3 minutes, so recipients access files instantly without needing a USB drive.

How do you password protect a folder on Windows?

On Windows Pro and Enterprise, right-click the folder, select Properties, click Advanced, and check "Encrypt contents to secure data." This uses EFS, which ties encryption to your Windows user account. On Windows Home, EFS is not available so you must use 7-Zip to create an AES-256 encrypted archive of the folder. For sharing folders externally, Peony lets you upload an entire folder to a secure data room with NDA gating before access, dynamic watermarks with the viewer's name in every frame, and AI auto-indexing that sorts documents into standard categories in under 3 minutes.

What is the most secure way to share files from Windows?

The most secure approach layers multiple controls: identity-verified access, password gating, dynamic watermarking with the viewer's name in every frame, screenshot blocking that logs attempts, link expiration, and instant revocation. Peony combines all six starting free and works on any Windows edition through the browser, so you never have to email raw attachments from Outlook.

Is BitLocker enough to protect my files?

BitLocker protects files at rest on your drive. If your laptop is lost or stolen, BitLocker prevents unauthorized access to the disk. But BitLocker does nothing after you share a file. Once you email an attachment or upload to a shared drive, BitLocker's protection ends. For files that leave your PC, Peony adds the controls BitLocker cannot: identity-bound access, page-level analytics, dynamic watermarks, screenshot protection, and instant access revocation.

Related Resources