fbclid is a tracker parameter added there by Facebook. It does not have the form of a path and does not correspond to any file on your site so it can't trigger DFIShield (Direct File Inclusion prevention).
If you get an fbclid parameter on your site that corresponds to an existing file on your site or has the form of a path it is not legitimate (it does not come from Facebook). Someone is abusing it to attack your site and Admin Tools blocks them, as it should.
While you can circumvent this protection it'd beat the purpose of having Admin Tools. Once of the many ways Admin Tools protects you is by preventing the abuse of well known URL parameters such as the marketing / tracking identifiers added by ad networks and social media. In other words, attackers trying to fly under the radar might use one of these well known URL parameters with malicious content (URLs to malware or spam, files on your server, SQL injection, ...). To further muddy the waters they'd use the same User Agent as the legitimate site but with an IP address which does NOT belong to the legitimate site.
Also remember that one of the typical ways malicious actors would harvest potential target URLs is, of course, by what is being shared on social media. That's their second most used source. The first most frequently used source is web search results.
So, how sure are you that the fbclid you are getting blocked is legitimately coming from Facebook and not, in fact, an actual attack on your site?
Nicholas K. Dionysopoulos
Lead Developer and Director
🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!