The preferred way to customize Windows object security settings is by adding new or modifying existing Entry elements in a disk security metadata file (for disk security) or in a hosting security metadata file instance corresponding to the hosting account that is authorized to access and manage the hosted objects (for hosting security). To learn why other customization options are not recommended, see Administering Object Security on Plesk-managed Server. For detailed description of the Entry element contents, see General Security Metadata Structure. For step-by-step instructions on modifying the disk security metadata file, see Customizing Disk Security. For step-by-step instructions on modifying the hosting security metadata files, see Customizing Hosting Security.

Note: Before making any changes to the security metadata, make a backup copy of the metadata file that you want to modify. For information why backing up security metadata files before modifying them is a good idea, see the sections Customizing Disk Security and Customizing Hosting Security.