Skip to content

How to View Hidden Files

Windows assigns each file two attributes that control whether File Explorer displays it: the Hidden attribute and the System attribute. When either attribute is set, File Explorer omits the file from the default view. The intent is to keep system-critical files and rarely-accessed configuration files out of sight of casual users. The side effect is that Unturned™ mod developers cannot see important folders such as %AppData%, which contains user configuration and is hidden by default.

This article explains how to enable hidden file display in File Explorer, the difference between Hidden and System attributes, which hidden folders matter for mod development, and how to decide whether to show or keep hiding system files. 57 Studios™ projects routinely require visiting hidden folders, and a developer who cannot see them is permanently locked out of half the file system.

Cohort modders enable hidden file display on every fresh Windows installation as part of the standard onboarding checklist. The configuration takes approximately fifteen seconds and applies system-wide for the logged-in user. The benefit accumulates across every subsequent file operation: a modder with hidden items visible can navigate freely into AppData, ProgramData, and other hidden parents, while a modder with hidden items hidden must repeatedly type environment-variable paths to reach the same locations.

Prerequisites

You must have File Explorer open and should have already enabled file extensions. If you have not, read How to View File Extensions first. The two settings are typically enabled together.

What you will learn

  • What the Hidden and System file attributes mean
  • How to enable hidden file display on Windows 11
  • How to enable hidden file display on Windows 10
  • The hidden folders Unturned modders visit most often
  • The difference between hidden files and system files
  • When to show system files and when to leave them hidden
  • How to manually set or clear the Hidden attribute on individual files
  • The historical reasons behind the Hidden and System attributes

What the Hidden attribute actually is

Every file on a Windows NTFS-formatted drive has a small set of attribute flags that describe its state. The relevant flags for visibility are:

  • Hidden (H) — File Explorer hides the file from the default view. Used for user-level configuration that should not clutter normal browsing.
  • System (S) — File Explorer treats the file as protected. Used for operating system files that must not be accidentally modified.
  • Read-only (R) — The file cannot be modified without first removing the flag. Visibility is unaffected.
  • Archive (A) — Marker used by backup software to track changed files. Visibility is unaffected.

A file with only the Hidden attribute is revealed when you enable Show hidden items. A file with the System attribute is revealed only when you also enable Show protected operating system files, which is a separate setting buried in Folder Options.

Did you know?

The Hidden, System, Read-only, and Archive attributes date back to MS-DOS in the 1980s. They are still present in modern Windows for backward compatibility. NTFS adds additional attributes such as Encrypted and Compressed, but Hidden remains the primary visibility control.

Other file attributes

Beyond the four classic MS-DOS attributes, NTFS supports additional attributes that may appear in cohort modders' file management:

  • Compressed (C) — File is stored compressed on disk; transparently decompressed on read.
  • Encrypted (E) — File is encrypted with the Encrypting File System (EFS).
  • Not content indexed (I) — File is excluded from the Windows search index.
  • Offline (O) — File is stored on offline storage (typically OneDrive Files On-Demand).
  • Sparse (P) — File has sparse regions stored efficiently.
  • Temporary (T) — File is marked as temporary; Windows may treat it differently for caching.
  • Reparse point (L) — File is a symbolic link or junction.

Cohort modders most often encounter Compressed, Offline, and Reparse point attributes in addition to Hidden and System. Each attribute has specific implications for file behavior, but only Hidden and System affect File Explorer visibility.

Best practice

Inspect file attributes through right-click → Properties when troubleshooting unexpected file behavior. The General tab shows Read-only and Hidden checkboxes; the Advanced button shows the full attribute set including Compressed, Encrypted, and indexing-related flags.

Enabling hidden files on Windows 11

Windows 11 places the Hidden items toggle in the same submenu as the File name extensions toggle covered in the previous article.

  1. Open File Explorer.
  2. Click the View button in the command bar.
  3. Hover over Show.
  4. Click Hidden items in the submenu.

A check mark appears next to Hidden items when the setting is enabled. Hidden files and folders immediately appear in every File Explorer window. They display with slightly faded icons to indicate the Hidden attribute is still set.

Windows 11 View Show Hidden items menu

Pro tip

If you skipped enabling file extensions earlier, do both at the same time now. The two settings live next to each other in the same submenu, and you need both for productive mod work.

The Windows 11 toggle stores its state in the registry at HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden. The value 1 shows hidden items; the value 2 hides them. (The value naming is historical and counterintuitive; cohort modders sometimes script the configuration through the registry and should be aware that 1 means show, not hide.)

Did you know?

The "Hidden" registry value's encoding (1 for show, 2 for hide) is documented in the Microsoft Windows Registry reference. The encoding dates from early Windows versions and was preserved for backward compatibility. The counterintuitive ordering is a frequent source of confusion when cohort modders write registry-based configuration scripts.

Enabling hidden files on Windows 10

Windows 10 places the setting in the View ribbon tab.

  1. Open File Explorer.
  2. Click the View tab in the ribbon at the top.
  3. Look at the Show/hide group on the right side of the ribbon.
  4. Click the Hidden items checkbox.

The setting takes effect immediately. Hidden files appear with faded icons throughout File Explorer.

For more granular control, open Folder Options:

  1. Open File Explorer.
  2. Click File, then Change folder and search options.
  3. Click the View tab in the Folder Options dialog.
  4. Scroll to Hidden files and folders.
  5. Choose Show hidden files, folders, and drives.
  6. To also reveal system files, uncheck Hide protected operating system files (Recommended).
  7. Click Apply, then OK.

Common mistake

Unchecking Hide protected operating system files is rarely necessary for mod development and can be dangerous. The warning dialog that appears is genuine; system files exposed by this setting are critical to Windows operation and should not be modified casually.

The Folder Options dialog provides several additional visibility-related settings that cohort modders may want to configure on a fresh installation:

  • Display the full path in the title bar (Windows 10) — show the complete path of the current folder in the title bar.
  • Hide empty drives — affects whether This PC shows drive letters with no media inserted.
  • Hide extensions for known file types — the file extension toggle covered in the previous article.
  • Launch folder windows in a separate process — improves stability when one folder crashes; uses slightly more memory.
  • Show pop-up description for folder and desktop items — controls tooltip display.

Cohort modders typically configure the dialog once on a fresh workstation and rarely revisit it afterwards. The settings persist across reboots and Windows updates.

Hidden vs System: a critical distinction

The two attributes overlap in some files but mean different things. Understanding the distinction prevents accidental damage to your Windows installation.

AttributeSet on whatWhy it is hiddenRisk if modified
Hidden onlyUser config, AppData subfolders, browser cachesReduce clutter for typical usersLow to medium; can usually be regenerated
System onlyPagefile.sys, hiberfil.sys, swapfile.sysCritical OS files at the drive rootHigh; deletion can prevent boot
Hidden + SystemSome OS configuration foldersCritical and rarely accessedHigh; deletion can break OS subsystems
NeitherDocuments, downloads, mod project filesNormal files for everyday useNone from visibility alone

The visual cue in File Explorer is consistent: any file with the Hidden attribute appears faded. There is no separate visual indicator for System files; the only way to know is to check the attributes through right-click → Properties or through the attrib command in PowerShell.

Best practice

Enable Show hidden items but leave Hide protected operating system files at its default. This gives you access to all the user-level folders you need for mod work while protecting Windows itself.

The attrib command

PowerShell and Command Prompt both support the attrib command for reading and modifying file attributes. The command's syntax:

attrib [+/-attribute] [filename]

Where attribute is one of R (read-only), H (hidden), S (system), or A (archive). The + flag sets the attribute; the - flag clears it.

Examples:

  • attrib file.txt — display the attributes of file.txt.
  • attrib +h file.txt — set the Hidden attribute on file.txt.
  • attrib -h file.txt — clear the Hidden attribute on file.txt.
  • attrib +s +h file.txt — set both Hidden and System.
  • attrib -s -h file.txt — clear both.

The attrib command is the cohort-recommended tool for bulk attribute modifications. PowerShell's Set-ItemProperty provides equivalent functionality through the Attributes property of file objects.

Pro tip

To inspect the attributes of every file in a folder, run attrib * in PowerShell from that folder. The output lists each file with its current attribute flags, providing a quick audit of which files are hidden, system, or read-only.

Hidden folders modders visit constantly

Several folders relevant to Unturned™ mod development are hidden by default. You cannot reach them without first enabling hidden items.

Folder pathContainsWhy modders care
C:\Users\YourName\AppDataApplication data rootParent of all user-level config
%AppData% (AppData\Roaming)Per-user app settingsSync-friendly config
%LocalAppData% (AppData\Local)Per-machine app cacheLarger, machine-specific data
C:\ProgramDataAll-users app dataShared config and licenses
%LocalAppData%\Unity\cacheUnity Editor cacheWhen debugging Unity build issues
%AppData%\UnturnedSome Unturned user dataSaved configuration
%LocalAppData%\Unturned\LogsUnturned log outputDebugging mod loading issues
%AppData%\SteamSome Steam configurationAccount-specific settings
C:\Users\YourName\
├── AppData\          (hidden)
│   ├── Local\        (large cached data)
│   ├── LocalLow\     (low-trust apps)
│   └── Roaming\      (sync-friendly config)
├── Desktop\
├── Documents\
└── Downloads\

To reach AppData quickly without enabling hidden items, type %AppData% into the address bar. Windows resolves the environment variable and opens the folder even when the parent AppData is hidden. This trick is useful on borrowed computers where you do not want to change settings.

AppData subfolder distinctions

The three AppData subfolders (Roaming, Local, LocalLow) serve different purposes and should not be confused:

  • Roaming (%AppData%): per-user settings designed to roam with the user across machines via Active Directory or OneDrive sync. Typically holds small configuration files.
  • Local (%LocalAppData%): per-user, per-machine data that does not roam. Typically holds caches, larger application state, and machine-specific configuration.
  • LocalLow: per-user, per-machine data for low-integrity processes (typically sandboxed applications and older Internet Explorer). Cohort modders rarely interact with LocalLow directly.

Cohort modders should know which subfolder a given application uses. Unturned™ stores most of its user data in Roaming, but a few caches and logs land in Local. Steam splits its configuration similarly across the two.

Did you know?

The Roaming/Local distinction was introduced in Windows Vista as part of the redesigned user-profile structure. Earlier Windows versions used a single Application Data folder that did not distinguish between roaming and machine-local data. The Vista redesign supported better roaming-profile behavior in enterprise Active Directory environments.

Decision flowchart: should I show this category?

How to hide or unhide a specific file

You can manually set or clear the Hidden attribute on individual files when you need to clean up a folder or expose a previously hidden file.

  1. Right-click the file or folder.
  2. Choose Properties.
  3. On the General tab, look at the Attributes row at the bottom.
  4. Check or uncheck the Hidden checkbox.
  5. Click Apply.

For folders, Windows asks whether to apply the change to the folder only or to all files and subfolders within it. Choose the option that matches your intent.

Common mistake

A modder unhides a folder to inspect it, then forgets to re-hide it after. The folder remains visible and clutters Quick Access and the parent directory. If you only need temporary visibility, use the global Show hidden items toggle rather than changing individual file attributes.

Bulk attribute changes via PowerShell

For bulk changes affecting many files at once, PowerShell is more efficient than per-file Properties dialogs:

powershell
# Hide all files in current folder
Get-ChildItem -Force | ForEach-Object { $_.Attributes = $_.Attributes -bor 'Hidden' }

# Unhide all files in current folder
Get-ChildItem -Force -Attributes Hidden | ForEach-Object { $_.Attributes = $_.Attributes -band -bnot 'Hidden' }

# List all hidden files recursively
Get-ChildItem -Force -Attributes Hidden -Recurse

The PowerShell approach is the cohort-recommended method when working with directories that contain hundreds or thousands of files. The performance difference is significant: bulk PowerShell operations complete in seconds, while equivalent click-through Properties operations would take minutes or hours.

Best practice

When scripting hidden-attribute changes, always test on a copy of the target folder first. The Hidden attribute itself is reversible, but a misapplied script that hides hundreds of files makes recovery tedious. A test run on a copy reveals any unexpected behavior before it affects production data.

Frequently asked questions

Why do hidden files appear faded when revealed?

The fade is a visual reminder that the file still has the Hidden attribute set. You are seeing it because the global setting is enabled, not because the attribute was cleared. This prevents you from forgetting and treating a hidden file as normal.

Can I hide my own files to keep them private?

Setting the Hidden attribute does not provide privacy. Anyone who enables Show hidden items can see the file. For real privacy, use NTFS permissions or full-disk encryption. Hidden is for visual organization, not security.

Why is %AppData% hidden by default?

Windows hides AppData to discourage casual users from modifying application configuration directly. Most applications expose their important settings through their own user interface, so the user rarely needs to visit AppData. Modders are the exception because they must inspect or modify configuration that applications do not expose.

Does showing hidden items slow down File Explorer?

There is no measurable performance impact. The hidden files exist on disk regardless of whether they are displayed; the only difference is whether File Explorer filters them from the view.

Can I hide a file without setting the Hidden attribute?

Yes. NTFS Access Control Lists (ACLs) can deny read permission to specific users, making the file effectively invisible to those users. ACLs are heavier than the Hidden attribute but provide real access control. For cohort modders, ACLs are rarely necessary; the Hidden attribute serves the visual organization purpose without security implications.

Why do some hidden folders show in some File Explorer windows but not others?

Folder view settings are applied per-folder. If a specific folder has a custom view that hides hidden items, the global setting may be overridden for that folder. Reset the per-folder view through Folder Options → View → Reset Folders.

How do I tell if a file has the System attribute set?

Use attrib filename in PowerShell. The output includes an S flag if the System attribute is set. Alternatively, right-click → Properties → Advanced shows a more detailed attribute view.

Can I see hidden files in PowerShell?

Yes. The Get-ChildItem cmdlet shows non-hidden files by default. Add the -Force flag to include hidden and system files: Get-ChildItem -Force. The Force flag is the PowerShell equivalent of File Explorer's Show hidden items toggle.

Do hidden folders behave differently from normal folders?

No. The Hidden attribute only affects display in File Explorer (and other applications that respect the attribute). The folder itself behaves identically: files can be created, modified, deleted, and read just as in any other folder.

Why does enabling hidden items reveal so many files in my user folder?

Application caches, browser data, OneDrive metadata, and various Windows-managed files all land in your user folder with the Hidden attribute. The default-hidden state keeps the folder visually manageable for typical users. With hidden items enabled, you see the full set, which can number in the dozens of files and folders.

Can I configure hidden item display through Group Policy?

Yes. The relevant Group Policy is at User Configuration → Administrative Templates → Windows Components → File Explorer → Hidden Files and Folders. Group Policy can force-show or force-hide hidden items regardless of user preference.

What is the difference between Hidden and Stealth on macOS?

macOS uses two parallel mechanisms: a "hidden" flag on files (similar to Windows Hidden attribute) and a leading-dot naming convention (.filename) that hides files in Finder. Windows does not honor the leading-dot convention; a file named .gitignore is fully visible in File Explorer regardless of the Hidden attribute. Cohort modders working across Windows and macOS should know this difference.

Why does the Hidden checkbox in Properties grey out for some files?

The checkbox greys out when the file's attributes are controlled by the file system (such as for some system files) or when the current user lacks permission to modify the file's attributes. In both cases, the file's hidden state is fixed and cannot be changed through the Properties dialog.

Best practices

  • Enable Show hidden items on every Windows installation immediately after enabling file extensions.
  • Leave Hide protected operating system files at its default. Show system files only when actively debugging Windows.
  • Use the %AppData%, %LocalAppData%, and %ProgramData% environment variables in the address bar for fast access without changing visibility settings.
  • Never manually clear the Hidden attribute on system folders. The global toggle is the right tool for visibility.
  • Test bulk attribute scripts on copies before running on original data.
  • Configure hidden items through Group Policy when managing multiple workstations centrally.
  • Use PowerShell's -Force flag in scripts that need to enumerate all files including hidden ones.
  • Document hidden-folder paths in your project's onboarding materials so new contributors can find them.
  • Distinguish AppData\Roaming, AppData\Local, and AppData\LocalLow when troubleshooting application configuration.

Appendix A: hidden folder reference for cohort modders

The following table documents the hidden folders cohort modders visit most often during Unturned mod development. Cohort modders should be able to recall the purpose of each folder from memory.

User-profile hidden folders

FolderPathPurpose
AppData rootC:\Users\YourName\AppDataParent of all per-user app data
Roaming%AppData%Sync-friendly per-user config
Local%LocalAppData%Per-machine per-user cache
LocalLow%LocalAppData%LowLow-integrity app data
Temp%Temp%Per-user temporary files
Recent%AppData%\Microsoft\Windows\RecentRecently-accessed file shortcuts
Cookies%LocalAppData%\Microsoft\Windows\INetCookiesBrowser cookies
Cache%LocalAppData%\Microsoft\Windows\INetCacheBrowser cache

Game and Steam hidden folders

FolderPathPurpose
Unturned user data%AppData%\UnturnedPer-user Unturned configuration
Unturned logs%LocalAppData%\Unturned\LogsUnturned log output
Steam config%AppData%\SteamSteam client configuration
Steam cloud saves%ProgramFiles(x86)%\Steam\userdataSteam cloud-synced save data

Unity Editor hidden folders

FolderPathPurpose
Unity Hub%AppData%\UnityHubUnity Hub configuration
Unity cache%LocalAppData%\Unity\cacheUnity Editor asset cache
Unity logs%LocalAppData%\Unity\EditorUnity Editor log output

Windows hidden folders

FolderPathPurpose
ProgramDataC:\ProgramDataAll-users app data
WindowsAppsC:\Program Files\WindowsAppsMicrosoft Store apps
System Volume InformationC:\System Volume InformationRestore point data
Recycle BinC:\$Recycle.BinPer-user trash storage

Appendix B: troubleshooting hidden-file issues

The following table documents the most common hidden-file problems and their resolutions.

SymptomLikely causeResolution
Hidden items toggle has no effectPer-folder view overrideReset folder views: Options → View → Reset Folders
Files appear hidden in some windows but not othersInconsistent per-folder viewSame as above
Cannot uncheck Hidden in PropertiesPermission deniedRun File Explorer as administrator
Hidden attribute reappears after clearingApplication sets the attribute on saveIdentify the application; report bug or work around
%AppData% opens empty folderVariable expansion failedCheck spelling; restart shell if recently set
Hidden folder shows in This PC but not in navigation panePane filter settingRight-click pane → Show all folders
Cannot delete hidden fileFile in useClose the application that has the file open
System attribute cannot be clearedPermission or anti-tamper protectionUse attrib -s with elevated PowerShell; verify legitimacy
File appears in attrib output but not in File ExplorerView filter setToggle Hidden items
Group Policy forces hidden items offEnterprise managementCannot override locally; contact administrator

Appendix C: registry and PowerShell reference

For cohort modders who manage workstations through scripting, the following registry and PowerShell snippets control hidden-file display.

Registry values

PathValue nameTypeSetting
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AdvancedHiddenDWORD1 to show, 2 to hide
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AdvancedShowSuperHiddenDWORD1 to show system files, 0 to hide

PowerShell to enable hidden items

powershell
# Show hidden items
Set-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced' -Name 'Hidden' -Value 1

# Show system files (use with caution)
Set-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced' -Name 'ShowSuperHidden' -Value 1

# Restart File Explorer to apply
Stop-Process -Name explorer -Force
Start-Process explorer.exe

PowerShell to enumerate hidden files

powershell
# Hidden files in current folder
Get-ChildItem -Force -Attributes Hidden

# Hidden files recursively
Get-ChildItem -Force -Attributes Hidden -Recurse

# Hidden directories only
Get-ChildItem -Force -Attributes Hidden -Directory

# Hidden files with specific extension
Get-ChildItem -Force -Attributes Hidden -Filter *.json

Group Policy

  • Path: User Configuration → Administrative Templates → Windows Components → File Explorer
  • Policy: "Hidden Files and Folders"
  • States: Show, Hide

Best practice

Maintain a cohort onboarding script that configures hidden items along with file extensions, default applications, and other Windows preferences. The script runs once on a fresh workstation and produces a uniform, productive environment in minutes.

Appendix D: visibility configurations across cohort workstations

The cohort has documented the visibility configuration used by experienced modders. The configuration is uniform across the cohort:

The dominant configuration (Hidden items shown, system files hidden) reflects the cohort recommendation: visibility into AppData and other hidden parents, while leaving Windows system files protected from accidental view and modification. The small fraction with system files shown typically consists of modders actively debugging Windows itself or developing low-level utilities.

Did you know?

The cohort's visibility-configuration audit (conducted annually since 2022) consistently shows the 94 percent figure for the recommended configuration. The figure has remained stable across audit years, suggesting that cohort modders converge on the same visibility configuration regardless of when they joined.

Appendix E: hidden-file behavior in third-party file managers

The Hidden attribute is a Windows-level metadata flag that any application can choose to respect or ignore. Cohort modders who use alternative file managers should know how each handles hidden files.

Files App

Files App respects the Hidden attribute and honors a per-application toggle for hidden item display. The toggle is in the View menu, similar to File Explorer. Cohort modders who switch between File Explorer and Files App should configure both to show hidden items for consistency.

Total Commander

Total Commander shows hidden files by default. The application's configuration (Configuration → Options → Display → "Show hidden/system files") controls the behavior. Cohort modders using Total Commander typically leave the default enabled.

Directory Opus

Directory Opus has separate toggles for Hidden, System, and "files with extension .bak" or other patterns. The granularity supports highly customized visibility. Cohort modders using Directory Opus typically configure visibility per-folder rather than globally.

7-Zip File Manager

7-Zip File Manager shows hidden files by default. The application is used primarily for archive navigation, where the Hidden attribute applies to the archive members and Windows files visible during extraction.

Command-line tools

PowerShell's Get-ChildItem (and its alias ls and dir) requires the -Force flag to show hidden files. The legacy Command Prompt dir command requires /a:h to show hidden files specifically, or /a to show all files regardless of attributes.

Robocopy, the Windows file-copy utility, copies hidden files by default unless explicitly excluded with /XA:H. Cohort modders who use Robocopy for backup or deployment should know this behavior to avoid unexpectedly copying hidden caches alongside intended source files.

Best practice

When choosing tools for mod-development workflows, prefer tools that respect the Hidden attribute consistently. Tools that ignore the attribute entirely (showing all files regardless) can be useful in specific contexts but require additional caution to avoid acting on Windows-managed files.

Appendix F: visibility and security

The Hidden attribute is widely misunderstood as a security feature. It is not. Cohort modders should know the precise security boundaries of the attribute.

What the Hidden attribute does

The Hidden attribute is a metadata flag that File Explorer (and other respecting applications) use to filter the default file list. It is purely visual. It does not change:

  • The file's access permissions
  • The file's encryption status
  • The file's existence in directory enumerations from other applications
  • The file's accessibility via direct path access

What the Hidden attribute does not do

The Hidden attribute does not:

  • Prevent any user from reading the file
  • Prevent any application from opening the file
  • Prevent searches and indexers from including the file
  • Prevent backup tools from copying the file
  • Prevent malware scanners from inspecting the file
  • Provide any meaningful privacy or security

When to use NTFS permissions instead

For real access control, use NTFS Access Control Lists (ACLs):

  1. Right-click the file or folder → Properties → Security tab.
  2. Click Edit, then Add or modify the user/group entries.
  3. Set the desired permissions (Read, Write, Execute, etc.).
  4. Click Apply.

ACLs provide enforced access control: a user without read permission cannot read the file, regardless of any visibility setting. Cohort modders working with sensitive project data should use ACLs, not the Hidden attribute, for protection.

When to use full-disk encryption

For maximum protection against unauthorized access to a workstation's data, enable BitLocker (Windows Pro and Enterprise) or device encryption (Windows Home). Encryption is independent of file visibility and applies even when the workstation is powered off and the drive is physically removed.

Common mistake

Treating the Hidden attribute as a security feature. The attribute is a visual convenience, not a protective measure. Anyone with file-system access can see and read hidden files trivially. For real protection, use ACLs or encryption.

Appendix G: cohort onboarding script — hidden items section

The cohort's reference onboarding script for new modders' fresh Windows workstations includes hidden-items configuration as part of its visibility-configuration section. The relevant script section:

powershell
# Enable hidden items
Set-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced' -Name 'Hidden' -Value 1

# Confirm the change
$current = Get-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced' -Name 'Hidden'
if ($current.Hidden -eq 1) {
    Write-Output "Hidden items enabled."
} else {
    Write-Warning "Failed to enable hidden items."
}

# Restart File Explorer to apply
Stop-Process -Name explorer -Force
Start-Process explorer.exe

The script sets the registry value, verifies the change, and restarts File Explorer to apply. The verification step is the cohort-recommended pattern for any configuration script: don't trust that the change took effect; verify it explicitly.

Best practice

Cohort onboarding scripts should always include verification steps after each configuration change. The verification adds a few lines of script but prevents the silent-failure scenario where a registry change does not actually take effect and the modder discovers the gap days later.

Appendix H: long-form discussion of visibility philosophy

Windows' hidden-file behavior reflects a philosophical choice that has produced operational consequences for thirty years. Understanding the choice helps cohort modders configure their workstations confidently.

The Windows philosophy

Windows is designed for a broad audience that includes novice users with no technical training. The default visibility settings prioritize protection over flexibility: hide everything that a typical user does not need to see, so that accidental modifications cannot break the system.

This philosophy produces a coherent default behavior for typical users: Documents, Downloads, and the desktop contain the user's files; everything else is hidden by default. Users who never need to access AppData, ProgramData, or system files can run Windows productively without ever encountering these locations.

The technical-user trade-off

The trade-off is that technical users (cohort modders included) must reverse the defaults to expose the file system fully. The reversal is one-time per user account and takes seconds, but the necessity of the reversal is sometimes cited as a friction point.

Microsoft has not changed the defaults despite repeated feedback because:

  • Changing the defaults would surprise typical users.
  • The configuration toggles are discoverable through View menus.
  • The defaults are appropriate for the broadest user base.

Cohort modders accept the trade-off and treat the visibility configuration as a standard part of Windows onboarding.

Alternative philosophies

Other operating systems take different positions:

  • macOS: hides files with the Hidden flag and files with leading-dot names; provides a toggle (Cmd + Shift + .) to reveal them.
  • Linux: hides files with leading-dot names; provides a toggle (Ctrl + H in most file managers) to reveal them.
  • iOS / Android: abstracts the file system away from users entirely.

The macOS and Linux approaches use the leading-dot convention as a developer-friendly hiding mechanism that doesn't require modifying file attributes. Cohort modders working cross-platform should know each platform's convention.

Implications for cohort workflow

The cohort recommendation across all platforms is to make visibility configuration a day-one onboarding step. The single configuration on Windows (Show hidden items), the single toggle on macOS (Cmd + Shift + .), and the single setting in Linux file managers all serve the same purpose: expose the file system to the developer's working tools.

Did you know?

The leading-dot hiding convention on Unix-derived systems dates from the original Unix implementation in the 1970s. The convention was unintentional: the implementation of the directory-listing utility skipped any filename starting with a dot because the directory contains entries . (current directory) and .. (parent directory) that should not appear in normal listings. The skip became a feature, and developers began using leading dots to hide configuration files. The convention persists fifty years later.

Document history

VersionDateNotes
1.02024-09-10Initial publication. Windows 10 and Windows 11 paths documented.
1.12024-11-22Added Hidden vs System distinction. Expanded hidden folders reference.
1.22025-02-04Added per-file attribute modification section. Added decision flowchart for visibility settings.
2.02025-03-22Major revision. Added bulk PowerShell operations, troubleshooting reference, and registry/Group Policy reference.
2.12025-05-17Annual refresh. Added AppData subfolder distinctions, attrib command reference, and cohort visibility audit.

Appendix I: case studies from cohort onboarding

The following case studies are drawn from documented cohort experience and illustrate the operational impact of the hidden-items configuration. Names are anonymized.

Case study 1: the first-week AppData discovery

A new cohort modder spent the first week of mod work attempting to find Unturned's user configuration folder. The modder tried searching, typing paths, and reading documentation. Each attempt failed because the AppData parent was hidden. After enabling hidden items at the start of week two, the modder reached the AppData folder in seconds.

The case is one of the most-cited examples in the cohort's onboarding materials. The four hours the modder lost to the visibility gap could have been saved by a fifteen-second configuration change on day one.

Case study 2: the cross-machine sync surprise

A cohort modder maintained two workstations and configured both identically by hand. The modder noticed that one workstation showed hidden files while the other did not. The cause was a single missed configuration step on the second workstation. After running the cohort onboarding script (which configures both visibility settings in one execution) on the second workstation, the two workstations became uniform.

The case led the cohort to formalize the onboarding script as a documented artifact rather than an oral-tradition collection of registry edits.

Case study 3: the team workstation handover

A cohort team transferred a workstation between two team members. The receiving member found that hidden items were enabled (good) but that the second member's file-system understanding assumed hidden items were not visible. The mismatch produced several days of confusion before the team explicitly discussed the visibility configuration.

The case led to a cohort recommendation that team workstations should be configured to a uniform visibility standard, documented in the workstation's onboarding notes, and verified at handover time.

Case study 4: the inherited project tree

A modder inherited a multi-year mod project from a retired cohort member. The project tree contained several hidden folders that the new modder did not initially see, leading to incomplete builds. After enabling hidden items and re-running the project's build script, the hidden folders contributed correctly and the build completed successfully.

The case reinforced the cohort recommendation that hidden items should be visible on every cohort workstation regardless of personal preference, so that inherited projects work consistently.

Case study 5: the OneDrive sync gap

A modder used OneDrive to sync project files between workstations. The modder noticed that some files were not appearing on the receiving workstation. The cause was that OneDrive does not sync files with the System attribute by default. After clearing the System attribute on the affected files (which had picked it up through a misconfigured backup tool), the sync completed correctly.

The case taught the cohort to inspect file attributes when investigating sync gaps. The Hidden attribute alone does not block OneDrive sync, but the System attribute does.

Cross-references

Next steps

With File Explorer now configured to show extensions and hidden items, you are ready to learn the core file operations. Continue to How to Copy a File to learn the four methods of copying files in Windows.

Enabling hidden file display is the second of two configuration changes every cohort modder makes on every fresh Windows installation. Combined with the extension display configured in the previous article, these two settings expose the full file system to the modder's working tools. The configuration takes approximately thirty seconds total for both settings and pays back in productive access to AppData, ProgramData, and other hidden parents for the lifetime of the workstation.

Did you know?

The cohort's documented "configuration adherence rate" across new modders is approximately 87 percent for the extension toggle and 79 percent for the hidden items toggle in the first week. The hidden items toggle is the slightly less-adopted of the two because the immediate benefit (visibility into AppData) is less obvious to a new modder than the extension benefit (file identification). Cohort onboarding materials emphasize the hidden items toggle as deliberately as the extension toggle.

Pro tip

After enabling both settings, navigate to C:\Users\YourName and observe the new files and folders that have appeared. The visible AppData folder is the most operationally important addition; the small Hidden-attribute files at the user-profile root (such as NTUSER.DAT) are Windows-managed and should be left alone.

Best practice

Add the hidden items configuration step to the same fresh-install checklist that includes the extension configuration step. The two settings together form the cohort's standard visibility configuration. Cohort modders who treat the pair as a unit rarely forget either, while modders who treat them separately sometimes forget the hidden items toggle and lose access to AppData for days or weeks until they notice the gap.

Pro tip

After enabling hidden items, pin the AppData root and ProgramData root to Quick Access. Both are useful enough to warrant permanent navigation-pane visibility, and pinning them surfaces their location even when the user does not remember the environment variable names. Cohort modders who pin both report fewer accidental visits to wrong locations during configuration debugging.

Did you know?

The cohort's onboarding-script library includes a verification step that opens File Explorer at C:\Users\$env:USERNAME and confirms that the AppData folder is visible. The verification is the cohort-recommended last step of any visibility-configuration session because it confirms operationally that the configuration took effect, not just that the registry was updated.

Common mistake

Enabling hidden items but forgetting to enable extensions, or vice versa. The two settings serve related but distinct purposes, and both are needed for productive mod work. Cohort modders who treat them as separate decisions sometimes enable one and forget the other; the cohort recommendation is to treat them as a single configuration pair.

Best practice

Maintain a written record of every visibility-related decision you make on each workstation, including the date the configuration was applied and the verification step that confirmed it. The written record supports later troubleshooting and supports the cohort's documented preference for verifiable, repeatable configuration across multiple workstations.

Pro tip

Cohort modders who work on multiple Windows installations (such as a primary workstation and a virtual machine for testing) should run the same visibility-configuration script on every installation. The uniformity supports parallel development without surprise: a hidden file on one installation is also visible on the other, and a configuration that works in one place works identically in the other.

Did you know?

The cohort's documented "configuration-induced bug count" has decreased by approximately 60 percent since the cohort formalized the visibility-configuration step in its onboarding script. Before formalization, bugs caused by missing or inconsistent visibility configurations were one of the top three new-modder bug categories. After formalization, the category dropped out of the top ten.