How to Unlock Excel: The Complete 2026 Guide to Unlocking Cells, Sheets, Files and Password-Protected Workbooks
Learn how to unlock Excel cells, sheets, workbooks, and password-protected files with step-by-step methods that work in Excel 2019, 2026, 365, and online.

Learning how to unlock Excel is one of those skills that seems trivial until the moment you actually need it, and then it becomes the single most important thing standing between you and a deadline.
Whether you inherited a locked spreadsheet from a coworker who left the company, forgot the password on a budget file you built six months ago, or downloaded a template that won't let you edit half the cells, the frustration is identical. The good news is that Excel offers several legitimate paths to unlock cells, sheets, and entire workbooks depending on what kind of protection is in place.
This guide walks through every realistic scenario you'll encounter in Excel 2019, Excel 2021, Microsoft 365, and Excel for the web. We'll cover the difference between sheet protection, workbook structure protection, file-level encryption, and the read-only flag, because each one requires a completely different approach. Confusing these is the number one reason people waste hours trying solutions that were never going to work for their specific situation in the first place.
Before we dive into procedures, it helps to understand why Excel locks things in the first place. Protection is designed to prevent accidental edits in shared workbooks, preserve formula integrity in templates, and keep sensitive financial or HR data away from unauthorized eyes. Microsoft built three independent layers: cell locking with sheet protection, structural locks that prevent renaming or deleting sheets, and AES-256 file encryption that requires the correct password to even open the document. Each layer has its own unlock procedure.
If you're the original creator of the file and you simply forgot which password you used, your options are surprisingly limited because Microsoft tightened encryption significantly starting with Excel 2013. Older brute-force tricks that worked on Excel 2003 files no longer apply to modern .xlsx documents protected with strong passwords. However, sheet protection and workbook structure passwords use a much weaker hashing scheme and can often be removed in under two minutes using a free method we'll demonstrate below using nothing but a file rename and a text editor.
For readers who need to refresh foundational skills before tackling protection settings, our Excel Functions List is a useful companion reference because many locked sheets contain complex formulas you'll want to understand before unlocking and modifying them. Knowing what a formula does prevents the all-too-common mistake of unlocking a workbook, editing a cell, and then accidentally breaking a dependency chain that ripples across twelve other tabs without warning.
Throughout this article you'll see practical steps you can follow today, screenshots-worthy click paths described in plain English, and honest warnings about which methods are legal, which require administrator approval, and which third-party tools are reputable versus risky. By the end you'll know exactly how to unlock Excel in whatever scenario you're facing, plus the prevention strategies that ensure you never get locked out of your own work again going forward.
One last note before we begin: always make a backup copy of any protected file before attempting to unlock it. Save the original as filename_BACKUP.xlsx in a separate folder. This single habit will save you from the heartbreak of corrupting a file mid-unlock and discovering that your only copy is now unreadable. It takes ten seconds and has prevented thousands of disasters across every office that has ever existed.
Excel Protection by the Numbers

Understanding the Types of Excel Protection
Prevents editing of specific cells or entire worksheets. Uses a weaker hashing algorithm that can be removed via the XML method in under two minutes, even without the original password.
Stops users from adding, deleting, hiding, or renaming sheets. Also uses legacy hashing and is removable with similar XML techniques. Does not encrypt content or hide data.
Full AES-256 encryption requiring the password to even open the file. Modern versions are essentially impossible to crack without the original password or a professional recovery tool.
A soft suggestion that opens the file in read-only mode unless the user clicks Edit. Not real security and removable in one click through File, Info, Protect Workbook.
Disables editing commands and shows a notification bar. Easily bypassed by clicking Edit Anyway. Useful for signaling completion but offers zero actual protection.
The most common scenario people face is a worksheet where most cells are locked and a small protected message appears whenever you try to type. This is sheet protection, the lightest form of Excel's three-tier security model, and removing it is straightforward when you have the password. Navigate to the Review tab on the ribbon, click Unprotect Sheet in the Changes group, enter the password if prompted, and the protection lifts immediately. Every cell becomes editable, formulas become visible, and you can format, delete, or restructure as needed without any further obstacles standing in your way.
When you don't have the password but legitimately own the file, the XML method is your best friend. Excel .xlsx files are technically ZIP archives containing XML documents that describe every aspect of the workbook. Rename the file extension from .xlsx to .zip, open it with any archive program, navigate to the xl/worksheets folder, and open sheet1.xml in a text editor like Notepad++ or VS Code.
Find the line that begins with sheetProtection and delete the entire tag from the opening bracket to the closing slash bracket. Save the file, rename the archive back to .xlsx, and reopen it. The protection is gone.
Unlocking individual cells within a protected sheet requires a slightly different approach because cell locking is a property of the cell itself, not the sheet. Right-click any cell, choose Format Cells, go to the Protection tab, and uncheck the Locked checkbox. This change has no effect until you protect the sheet again, at which point only the cells you unchecked will accept input. This is the standard pattern for creating fillable forms where users can type in designated input boxes but cannot accidentally modify the surrounding formulas, headers, or calculated outputs.
Workbook structure protection is a separate setting accessed through Review, Protect Workbook. When enabled, you cannot right-click sheet tabs to insert, delete, rename, hide, or unhide them. The Unprotect Workbook command on the same menu reverses this with the password. The XML approach also works here, but you'll target the workbook.xml file inside the archive instead of the worksheet files. Look for the workbookProtection tag and delete it. This is particularly useful when inheriting templates from departed coworkers whose passwords were never documented anywhere.
For frequent reference work, our Excel Data Analysis Toolpak guide explains how to unlock advanced statistical features that require enabling an add-in rather than removing protection. Many users confuse missing functionality with locked features, so understanding which tools are merely disabled versus protected can save significant troubleshooting time. The Data Analysis ribbon group in particular is hidden by default and requires explicit activation through File, Options, Add-ins, but it is not actually locked or protected in any security sense.
One scenario that catches even experienced users off guard is the shared workbook lock. When a file is open in another user's Excel session on a network drive, you'll see a message stating the file is locked for editing. This isn't password protection at all; it's a coordination mechanism preventing two people from making conflicting edits simultaneously. The fix is to identify who has the file open and ask them to close it, or open as read-only and copy your changes to a new file once they release the lock.
Finally, there is the read-only file attribute set at the operating system level. Right-click the file in Windows Explorer, choose Properties, and uncheck the Read-only box at the bottom. This is not Excel protection at all but a Windows filesystem permission. It commonly happens with files copied from USB drives, downloaded from email, or transferred from older filesystems. Always check this attribute first when a file refuses to save, because it's the simplest fix and often goes overlooked for hours of unnecessary troubleshooting.
Unlocking Password-Protected Workbooks Like a VLOOKUP Excel Pro
When you know the password, unlocking a file-level encrypted workbook is a single command. Open the file, type the password at the prompt, then go to File, Info, click the Protect Workbook button, choose Encrypt with Password, delete every character in the password field, and click OK. Save the file and it will now open without any password prompt for anyone.
This is also the correct method when transferring ownership of a workbook to a colleague who doesn't need encryption, or when uploading to a SharePoint or OneDrive library where the platform handles access control. Always document the change in your team's shared notes so future users know the file is intentionally unprotected and not accidentally exposed.

Unlocking Excel: Benefits vs Risks
- +Recover access to inherited workbooks when coworkers leave
- +Edit templates and forms that were over-protected
- +Restore your own forgotten password-protected files
- +Modify formulas and structures locked for no business reason
- +Enable collaboration when original creator is unavailable
- +Fix corrupted protection settings that block legitimate work
- +Audit and update old financial models with current data
- −May violate company policy if file isn't yours to unlock
- −Removes audit trail and accountability for changes
- −Strong AES-256 encryption is often unrecoverable
- −Third-party tools can introduce malware risks
- −Online unlock services may steal sensitive data
- −Time investment can exceed rebuilding the file from scratch
- −Modifying inherited models risks breaking complex dependencies
Complete Excel Unlock Checklist: How to Create a Drop Down List in Excel Without Protection Headaches
- ✓Make a backup copy of the file before attempting any unlock procedure
- ✓Identify whether the protection is cell-level, sheet-level, workbook structure, or file encryption
- ✓Check Windows file properties for the read-only attribute first
- ✓Try the Review tab Unprotect Sheet command if you have the password
- ✓Use the XML rename method for sheet protection when password is forgotten
- ✓Confirm legal ownership and authorization before unlocking any file
- ✓Test recovered files thoroughly to verify formulas and references still work
- ✓Save the unlocked version with a new filename to preserve the original
- ✓Document all changes in a shared team log for accountability
- ✓Re-apply appropriate protection after editing if the file goes back to shared use
Always store passwords in a manager, not a sticky note.
Use a dedicated password manager like 1Password, Bitwarden, or LastPass with a dedicated entry for every protected workbook you create. Include the file path, creation date, and intended audience. This single habit eliminates 95% of future unlock requests and protects sensitive data far better than any spreadsheet of passwords stored on your desktop.
For users comfortable with code, VBA offers a programmatic approach to removing sheet protection that doesn't require renaming files or editing XML. Open the Visual Basic Editor with Alt+F11, insert a new module, and paste a brute-force loop that tries every combination of characters until protection lifts. This approach works because sheet protection in legacy Excel files uses a simple hash that produces collisions with short alphanumeric strings. The script typically completes in seconds, but it only works on the older protection scheme and is blocked entirely by modern file encryption.
The exact VBA code is widely available through forums like Stack Overflow and the official Microsoft community, and we won't reprint it here because the syntax has subtle variations between Excel versions that can cause crashes if copied incorrectly. Always test such macros on a backup file first, never on your only copy. If the macro reports success but the sheet still appears protected, close and reopen the file because Excel sometimes caches the protection state in memory even after the underlying property has been cleared by code execution.
Power Query and Power Pivot models add another layer of complexity because they store transformation steps and data models inside the workbook that may be independently locked from worksheet protection. To unlock a Power Query, open the Queries and Connections pane, right-click the query, and check whether Edit is greyed out. If so, the query is locked by workbook structure protection and unlocking the structure as described earlier will restore edit access. Power Pivot tabular models follow the same pattern but require the Power Pivot add-in to be enabled in File, Options.
Macro-enabled workbooks with the .xlsm extension introduce VBA project protection as a fifth layer beyond the four covered above. This protects the macro code itself from being viewed or modified, separate from worksheet and workbook protection. Unlocking VBA project passwords is technically possible through hex editing of the file's binary structure, but the procedure is intricate and version-specific. For most users, contacting the original developer is faster than attempting to crack VBA project protection through manual means.
SharePoint and OneDrive add their own permission layer that can override local Excel protection entirely. A file may open in your browser as read-only because your SharePoint role doesn't include edit permission for that library, regardless of whether the .xlsx file itself contains any password protection. The fix here is administrative rather than technical: request elevated permissions from your site owner or IT administrator. No amount of Excel unlocking can override a SharePoint permission denial, because the platform enforces access before Excel ever opens the file.
Co-authoring sessions on cloud-stored workbooks introduce a temporary lock when another user is actively editing the same range. This isn't password protection but a real-time conflict prevention mechanism. Wait for the other user to finish or move to a different range, and the lock releases automatically within seconds. If a co-author's session crashes and leaves a stale lock, the file owner can force-release it through the SharePoint admin center or by closing all sessions and reopening.
Finally, for organizations with Information Rights Management deployed via Azure, workbooks may be encrypted at rest using IRM templates that restrict copying, printing, or editing based on user identity. These restrictions persist even after a file is downloaded and cannot be removed through any Excel unlock procedure because the encryption keys are held by the Azure tenant. The only way to remove IRM is through the document's original author or the Azure administrator changing the assigned IRM policy at the source.

Only unlock Excel files you own or have explicit written authorization to modify. Unlocking corporate, financial, or personal files belonging to others without permission may violate the Computer Fraud and Abuse Act in the US and similar laws in other countries. When in doubt, contact the file owner or your IT department before attempting any unlock procedure described in this guide.
Prevention is dramatically easier than recovery, so building good protection habits saves enormous time over the long run. Start by deciding for each new workbook whether protection is actually necessary. Many files get protected reflexively when no real business need exists, and this creates future friction for every collaborator who has to ask for the password. Reserve sheet protection for templates with formulas users shouldn't accidentally overwrite, and reserve file encryption for genuinely sensitive data like payroll, customer PII, or unreleased financial reports.
When you do apply protection, document the password immediately in your team's shared password manager under a consistent naming convention. Include the file's location, purpose, and approved users. This single discipline eliminates the most common cause of forgotten passwords, which is the assumption that you'll remember a password you set once for a file you might not open again for eighteen months. Memory simply doesn't work that reliably, especially for passwords that combine uppercase, lowercase, symbols, and numbers as security policies typically require.
Consider whether platform-level access controls might replace file-level passwords entirely. SharePoint, OneDrive, Google Drive, and Box all offer per-user and per-group permissions that handle access more robustly than passwords. Removing the password from a workbook and storing it in a permissioned folder is often the more maintainable solution because access can be granted or revoked instantly without touching the file itself. This also creates an audit trail showing who accessed the file and when.
For shared templates, separate the protected logic from the user input by placing all formulas on a hidden sheet that is protected, while leaving the input sheet completely open. Users fill in their data on the open sheet, formulas calculate on the hidden sheet, and outputs display on a third presentation sheet. This pattern eliminates the temptation to unlock everything just to fix one input cell, because the input sheet was never locked in the first place. It's a small design change with large workflow benefits.
Our guide to creating reports in Excel shows the full template architecture pattern with separated input, calculation, and output layers. Following that structure from the start prevents the typical scenario where a single monolithic sheet becomes increasingly protected over time as different stakeholders add restrictions, until eventually nobody remembers what each protection layer was supposed to prevent. Clean separation makes protection decisions obvious and reversible.
Version control is the third pillar of prevention. Keep dated copies of important workbooks in a backup folder or use a service like OneDrive's version history, which automatically retains the last several hundred saves. When something goes wrong, restoring a previous version is faster than unlocking and repairing the current one. Version history is enabled by default on modern Microsoft 365 OneDrive and SharePoint sites, so simply storing files there gives you automatic protection against accidental corruption.
Finally, train your team. Most unlock requests originate from users who didn't understand what protection they were applying or how to set passwords they could remember. A fifteen-minute team meeting covering the three protection layers, the password manager workflow, and the platform alternatives will pay back its time investment dozens of times over the following year. Pair the training with a shared cheat sheet stored in your team wiki, and you'll see unlock requests drop dramatically within a few months of consistent practice.
Putting all these techniques together into a practical workflow makes the difference between confident problem-solving and frantic Googling at deadline time. When you encounter a locked file, work through a mental decision tree: first check the file properties for Windows read-only attribute, then attempt to open the file to see whether it requires a password or opens normally. If it opens, the protection is at the sheet or workbook level and your unlock path is the XML method or the Review tab if you have the password. If it requires a password to open, you're facing file encryption.
For everyday office work, the sheet-level XML method handles roughly eighty percent of unlock requests because most accidental protection happens at the sheet level. Memorize the four steps: backup the file, rename .xlsx to .zip, edit the sheetProtection tag out of sheet1.xml, rename back to .xlsx. This procedure works on Windows, Mac, and Linux because the underlying ZIP and XML formats are platform-independent. You don't need any paid software, no internet connection, and no administrator privileges.
When the XML method doesn't apply because you're facing real encryption, evaluate honestly whether the file is worth recovering. If the data inside represents weeks of irreplaceable work, commercial password recovery software at thirty to seventy dollars is a reasonable investment. If the file is a downloaded template or something easily rebuilt, your time is better spent recreating the workbook from scratch with documented passwords this time around. Recovery tools can take hours or days and offer no guarantee of success against strong passwords.
Build a personal toolkit that lives on a USB drive or cloud folder you can access from any machine. Include a portable text editor like Notepad++ Portable, a portable archive tool like 7-Zip Portable, and a copy of your team's standard unlock procedure document. When a colleague brings you a locked file, you can plug in the drive and have them unlocked within five minutes regardless of which workstation you happen to be sitting at. This level of preparation positions you as the office Excel expert and saves the entire team significant time.
Maintain a personal log of every unlock you perform, including the file name, type of protection encountered, method used, and time required. After thirty or forty entries you'll start to see patterns in your organization's common problems. Maybe finance always over-protects, or maybe HR consistently uses the same forgotten password. These insights inform conversations with department leads about training opportunities and policy adjustments that reduce future unlock requests organization-wide rather than just patching individual files.
Stay current on Excel protection changes because Microsoft updates the underlying security model periodically. The XML method that works today on Excel 365 may behave differently in Excel 2030 if Microsoft strengthens the worksheet protection hash. Subscribe to the Microsoft 365 message center, follow the Excel team blog, and join the r/excel community on Reddit to catch protection-related changes early. Being two months ahead of your coworkers on these updates makes you the go-to expert when issues arise.
Finally, remember that the best unlock is the one you never have to perform because the file wasn't locked in the first place. Champion the philosophy that protection should be intentional, documented, and reversible. Every protection decision should answer the question: who specifically might do what specifically that we need to prevent? If you can't answer that clearly, the protection probably shouldn't exist. This mindset prevents the cultural drift toward over-locking that makes Excel feel like an obstacle course rather than a productivity tool.
Excel Questions and Answers
About the Author
Business Consultant & Professional Certification Advisor
Wharton School, University of PennsylvaniaKatherine Lee earned her MBA from the Wharton School at the University of Pennsylvania and holds CPA, PHR, and PMP certifications. With a background spanning corporate finance, human resources, and project management, she has coached professionals preparing for CPA, CMA, PHR/SPHR, PMP, and financial services licensing exams.