Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Personal, Enterprise, Government and Military security levels | Read The Rationale https://github.com/HotCakeX/Harden-Windows-Security/blob/main/Rationale.md
To resolve this issue https://github.com/HotCakeX/Harden-Windows-Security/issues/115, removing Strict CFG from explorer.exe process mitigations.
CFG (Control Flow Guard) is already enabled by default in Windows, just not in strict mode.
More info: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exploit-protection-reference?view=o365-worldwide#control-flow-guard-cfg