A seemingly empty folder appearing on Windows systems after recent security updates has raised concerns among users, but Microsoft confirms it’s an intentional security measure that should remain untouched.
The directory, typically located at C:\inetpub, serves as a crucial component in mitigating a recently patched vulnerability, even for users who don’t run web server software.
The mysterious folder has been appearing on Windows 10 and 11 systems following Microsoft’s April 2025 Patch Tuesday updates.
While many users might be tempted to delete what appears to be an empty, unnecessary directory, Microsoft has explicitly warned against such action.
Understanding the New “inetpub” Folder
Microsoft stated in its advisory, “After installing the updates listed in the security updates table for your operating system, a new % systemdrive%inetpub folder will be created on your device. ”
“This folder should not be deleted regardless of whether Internet Information Services (IIS) is active on the target device. This behavior is part of changes that increase protection and does not require any action from IT admins and end users”.
The Register reports that the directory creation is directly tied to patching CVE-2025-21204, a significant elevation-of-privileges vulnerability within Windows Process Activation Service.
This security flaw, if exploited, could potentially grant malware or unauthorized users system-level file management privileges, posing a serious security risk to Windows environments.
The inetpub folder, typically associated with Microsoft’s Internet Information Services (IIS) web server software, is being created with specific read-only SYSTEM-level access permissions as part of the vulnerability mitigation strategy.
This implementation works as an additional security layer, blocking potential privilege-escalation exploits targeting this vulnerability.
The security implementation works by establishing a hardened directory with the following protection characteristics:
Microsoft provides a straightforward solution to restore proper protection for users who have already deleted the directory.
Through the Windows Control Panel, navigate to Programs and Features, select “Turn Windows features on or off” from the left panel, and temporarily enable IIS by highlighting it and clicking “OK.”
This process will recreate the folder with the correct system permissions. After the folder is properly restored, users can disable IIS.
Alternatively, advanced users can manually recreate the folder with the required read-only access and SYSTEM-level ownership.
Microsoft has confirmed that there is currently no evidence of CVE-2025-21204 being exploited in the wild, and no exploit code has been publicly shared.
Nevertheless, maintaining the patch integrity, including the inetpub folder, remains crucial for ensuring system security against potential future attacks.
While the sudden appearance of an empty folder might trigger security concerns for vigilant Windows users, the directory represents an important security enhancement rather than a threat in this case.
Microsoft’s implementation demonstrates a proactive approach to security, with the inetpub folder serving as an integral component of the protection mechanism against a potentially dangerous privilege escalation vulnerability.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!