windows security unauthorized changes blocked controlled folder access blocked

If you just installed Windows 11 25H2 and suddenly your desktop is flashing with “Protected memory access blocked” alerts, you’re not crazy. This is a massive false positive issue impacting key Microsoft executables.

Here is the quick breakdown of why this is happening and the fix.

Why Controlled Folder Access (CFA) is a Great Idea

Before we fix it, know that CFA is a brilliant security layer. It’s Microsoft’s core defense against Ransomware.

Note that CFA is NOT enabled by default but anyone who is serious about cybersecurity will have turned it on and if you haven’t you should… immediately!

  • How it Works: CFA acts as a gatekeeper for critical folders like your Documents, Pictures, Videos, and Desktop
  • The Protection: Only apps on an established “trusted list” are allowed to make changes to files in these protected locations. An untrusted program (like a ransomware script) trying to encrypt your files is instantly blocked
  • The Tradeoff: When an app does something suspicious, even if it’s legitimate, CFA blocks it first and asks questions later, resulting in our false positives

That trade-off is why Microsoft has not enabled CFA by default. They learned from other security measures, like Windows Vista‘s “User Access Control” feature, that most consumers want convenience over security.

The 25H2 Spike: Microsoft’s Official Reason

You’re not imagining the increase in alerts after the 25H2 upgrade. Microsoft confirmed that the spike is due to:

  1. Stricter Heuristics: The new 25H2 security components (Defender SmartScreen, file access telemetry) use more sensitive behavioral rules. Apps that dynamically load DLLs or update their data in a manner that now resembles a ransomware tactic are getting flagged, even if they are signed Microsoft programs
  2. Upgrade Removing Apps You Already Whitelisted: If you used an enablement package, certain legacy trust settings or exclusions might not have migrated cleanly, forcing a re-evaluation of trust for system executables

The result is CFA mistakenly blocking entirely legitimate applications like:


ExecutablePathFunctionSafe to Allow?
amdow.exeProgram Files\AMD\CNext\CNext\amdow.exeAMD driver component, likely related to Radeon overlay or telemetryYes, if you use AMD Radeon software
AMDRSServ.exeProgram Files\AMD\CNext\CNext\AMDRSServ.exeAMD Radeon Settings service manages display and driver settingsYes, if you use Radeon Settings
cmd.exeC:\Windows\System32\cmd.exeCommand Prompt used by scripts, installers, and automation toolsYes, if part of your workflow
cmd.exeC:\Windows\SysWOW64\cmd.exe32-bit version of Command PromptYes, same as above if used legitimately
conhost.exeC:\Windows\System32\conhost.exeConsole Windows Host that the the middleware between command line and Windows GUIYes, if triggered by trusted scripts
dllhost.exeC:\Windows\SysWOW64\dllhost.exeCOM Surrogate core Windows process for handling DLLsYes, if path matches system default
identity_helper.exeC:\Program Files (x86)\Microsoft\Edge\Application\142.0.3595.19\identity_helper.exeMicrosoft Edge identity componentYes, but best added via wildcard exclusion as explained below
msedge.exeC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeMicrosoft Edge browser executableYes, but versioned path requires wildcard exclusion as explained below
OfficeC2RClient.exeC:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exeMicrosoft Office Click-to-Run update clientYes, if path is legitimate
reg.exeC:\Windows\System32\reg.exeRegistry Editor CLI used to read/write registry keysYes, if part of known scripts or installers
schtasks.exeWindows\System32\schtasks.exeWindows Task Scheduler CLI used for creating and managing scheduled tasksYes, if used by trusted apps or scripts

The Fix: How to See the Full Path & Whitelist Permanently

Because these apps are blocked due to behavioral changes and not reputation, we need to manually add them to the Allow List (whitelist).

NOTE: This is definitely reducing your security but considering the vast majority of consumers and companies do not have CFA enabled at all, you will still be wildly more secure than the average.

1. Identify the Full Path of the Blocked App


add exception to controlled folder access

To whitelist the app, you need its exact location. The easiest way to get this is through the Windows Security UI:

  1. Click START and type Windows Security, then click on it
  2. Click Virus & Threat Protection
  3. Under Ransomware protection section, click Manage ransomware protection
  4. Click Allow an app through Controlled folder access
  5. Click Add an allowed app and select Recently blocked apps
    • This list will show the full path (e.g., C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe) for all the apps CFA recently blocked
    • This will be a good indication if the app is really from Microsoft or not.
      • For instance, if you see C:\USERS\YourName\APPDATA\TEMP\OfficeC2RClient.exe as the path… its likely malware.

2. Implement the Permanent PowerShell Exclusion (Required for Edge)

Simply allowing a constantly updating app like Edge through the UI is a temporary fix, as the version number in its path changes constantly (e.g., ...Edge\Application\**142.0.3595.19**\msedge.exe). We need a wildcard for a permanent solution. Unfortunately this cannot be completed using the Windows GUI; you have to use command line.

  1. RIGHT CLICK on the START button and look for WINDOWS TERMINAL (ADMIN) or POWERSHELL (ADMIN)
    • Make sure you are running that AS AN ADMINISTRATOR
  2. Execute the following commands one by one to add the necessary exclusions.
    • This uses the * wildcard to bypass version number changes for Edge components

For Edge (using Wildcards for future updates):

PowerShell

Add-MpPreference -ControlledFolderAccessAllowedApplications "C:\Program Files (x86)\Microsoft\Edge\Application\*\identity_helper.exe"
Add-MpPreference -ControlledFolderAccessAllowedApplications "C:\Program Files (x86)\Microsoft\Edge\Application\*\msedge.exe"

For other critical Microsoft system apps:

PowerShell

Add-MpPreference -ControlledFolderAccessAllowedApplications "C:\Windows\System32\dllhost.exe"
Add-MpPreference -ControlledFolderAccessAllowedApplications "C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe"

Once complete, the false positive alerts will stop, and your essential Microsoft applications will function correctly, all while keeping the core ransomware protection of Controlled Folder Access fully enabled.



0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *