Affected versions: Windows Server 2012 R2

πŸ“– ~1 min read

Table of contents
  1. Symptom & Impact
  2. Environment & Reproduction
  3. Root Cause Analysis
  4. Quick Triage
  5. Step-by-Step Diagnosis
  6. Solution – Primary Fix
  7. Solution – Alternative Approaches
  8. Verification & Acceptance Criteria
  9. Rollback Plan
  10. Prevention & Hardening
  11. Related Errors & Cross-Refs
  12. References & Further Reading

Symptom & Impact

Internal MSI installers and helper utilities trigger SmartScreen warnings on Windows Server 2012 R2, blocking admins and automation that download files from intranet sources.

Environment & Reproduction

Common when binaries lack a known publisher reputation.

Get-MpPreference | Select PUAProtection
Get-ItemProperty 'HKLM:SOFTWAREMicrosoftWindowsCurrentVersionExplorer'

Root Cause Analysis

SmartScreen relies on Microsoft reputation services; new or unsigned files default to blocked.

Quick Triage

Reproduce the block and capture context.

Get-WinEvent -LogName 'Microsoft-Windows-SmartScreen/Debug' -MaxEvents 20 -ErrorAction SilentlyContinue
Get-ItemProperty 'HKLM:SOFTWAREPoliciesMicrosoftWindowsSystem' | Select EnableSmartScreen,ShellSmartScreenLevel

Step-by-Step Diagnosis

Check Mark of the Web on downloaded files.

Get-Item 'C:Installersapp.msi' | Unblock-File
Get-Content 'C:Installersapp.msi:Zone.Identifier' -ErrorAction SilentlyContinue
Illustrative mockup for windows-server-2012-r2 β€” error_dialog
SmartScreen warning dialog β€” Illustrative mockup β€” Progressive Robot

Solution – Primary Fix

Sign installers and clear MOTW for trusted intranet sources.

Still having issues? Our IT Consulting team can diagnose and resolve this for you. Get in touch for a free consultation.

Set-AuthenticodeSignature -FilePath 'C:Installersapp.msi' -Certificate (Get-Item Cert:CurrentUserMy)
Unblock-File 'C:Installersapp.msi'
New-ItemProperty 'HKLM:SOFTWAREPoliciesMicrosoftWindowsSystem' -Name ShellSmartScreenLevel -Value Warn -PropertyType String -Force
Illustrative mockup for windows-server-2012-r2 β€” terminal_or_powershell
SmartScreen registry settings β€” Illustrative mockup β€” Progressive Robot

Solution – Alternative Approaches

Disable SmartScreen for managed servers only via GPO if signing is not feasible.

New-ItemProperty 'HKLM:SOFTWAREPoliciesMicrosoftWindowsSystem' -Name EnableSmartScreen -Value 0 -PropertyType DWord -Force
gpupdate /force

Verification & Acceptance Criteria

Installers run with no SmartScreen warning for verified internal binaries.

Get-AuthenticodeSignature 'C:Installersapp.msi'

Rollback Plan

Re-enable SmartScreen if disabled temporarily.

New-ItemProperty 'HKLM:SOFTWAREPoliciesMicrosoftWindowsSystem' -Name EnableSmartScreen -Value 1 -PropertyType DWord -Force

Prevention & Hardening

Code-sign in-house tools and host installers on a trusted internal CA-signed share.

Get-ChildItem 'C:Installers' | Get-AuthenticodeSignature | Select Path,Status

Linked with AppLocker, Defender false positives, and Code Integrity rejections.

Related tutorial: View the step-by-step tutorial for Windows Server 2012 R2.

View all Windows Server 2012 R2 tutorials on the Tutorials Hub β†’

Browse all common problems & solutions on the Tutorials Hub.

References & Further Reading

Microsoft Learn: SmartScreen policy and Authenticode signing.

Need Expert Help?

If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today β€” we respond within one business day.