Home Protection Basics

Simple home security, safety, and insurance guides for normal homeowners.

Door and Window Gap Inspection: Finding the Openings Intruders Exploit

Every exterior opening—doors, windows, sliders, sidelights—has one unavoidable weakness: gaps. If the gaps are too large or uneven, intruders can pry them open quietly. Gaps also signal structural problems, misaligned locks, and frame movement that weaken the entire entry point.

Before adjusting anything, review the principles in High-Risk Entry Point Analysis so you know which openings matter most.

1. What Counts as a Security Gap?

A security gap is any space big enough for a pry tool, screwdriver, or even just leverage from outside pressure. If you can see light through a gap, it’s almost always too big.

General Red Flags

Gaps don’t just reduce security—they ruin efficiency and indicate frame movement that will get worse.

2. How to Inspect Door Gaps

Close the door and look at the perimeter: top, hinge side, latch side, and bottom threshold. Each area has its own risks.

Top Gaps

Hinge-Side Gaps

Latch-Side Gaps

Bottom Gap

For reinforcement details, review Reinforcing Door Frames.

3. How to Inspect Window Gaps

Window gaps usually indicate loose sashes, frame flex, or worn hardware. Sliders and double-hung windows hide the worst problems because the tracks can wear down or warp over time.

Look For

If a sash can be lifted or shifted horizontally while “locked,” the hardware is not doing anything. Fixing hardware issues is covered in the Window Lock Guide.

4. Measuring Gaps Properly

You don’t need tools beyond a flashlight and a simple feeler gauge or credit card. The goal is accuracy, not overcomplication.

5. Fixing Door Gap Problems

Once you identify the problem, the fixes are straightforward:

6. Fixing Window Gap Problems

Windows require different fixes depending on the type.

7. Prioritize the Biggest Gaps First

Large gaps = fast entry. Fix the widest openings, then reinforce the frame, then upgrade hardware. That sequence eliminates the most predictable vulnerabilities in the shortest time.