Publishers

Check Point Endpoint Security Check Point Endpoint Security





A way to uninstall Check Point Endpoint Security from your system

You can find on this page details on how to remove Check Point Endpoint Security for Windows. It is developed by Check Point Software Technologies Ltd.. Go over here for more details on Check Point Software Technologies Ltd.. More information about the application Check Point Endpoint Security can be found at . Usually the Check Point Endpoint Security program is placed in the C:\Program Files (x86)\CheckPoint\Endpoint Security folder, depending on the user's option during setup. The complete uninstall command line for Check Point Endpoint Security is MsiExec.exe /X{D164EDAA-8098-46B7-8866-A8CA0022339F}. EPLauncher.exe is the programs's main file and it takes approximately 1.72 MB (1807400 bytes) on disk.

Check Point Endpoint Security is composed of the following executables which occupy 21.68 MB (22732024 bytes) on disk:

  • cpda.exe (1.40 MB)
  • CPRegSvr.exe (135.66 KB)
  • cpvinfo.exe (63.66 KB)
  • dlg.exe (187.54 KB)
  • dnuninst.exe (173.54 KB)
  • EP_CDT.exe (44.11 KB)
  • fwcpp.exe (33.49 KB)
  • IDAFServerHostService.exe (215.04 KB)
  • PacketMon.exe (165.50 KB)
  • PushOperationsRepairHelper.exe (92.54 KB)
  • cpinfo.exe (164.04 KB)
  • CpInfoPreboot.exe (466.54 KB)
  • cp_uploader.exe (3.19 MB)
  • DumpSMBios.exe (67.54 KB)
  • ListInstalledApps.exe (72.54 KB)
  • ListPartitions.exe (98.54 KB)
  • lspol.exe (48.00 KB)
  • drvslv7x.exe (1.14 MB)
  • fdecontrol.exe (868.54 KB)
  • FDE_Drive_Slaving.exe (1.69 MB)
  • UseRec.exe (846.30 KB)
  • CPEPNotifier.exe (47.02 KB)
  • cptrayLogic.exe (89.04 KB)
  • cptrayUI.exe (125.04 KB)
  • EPLauncher.exe (1.72 MB)
  • logProcessor.exe (127.04 KB)
  • wkhtmltopdf.exe (8.17 MB)
  • EPWD.exe (276.04 KB)
  • EPWD_Tool.exe (60.04 KB)
...click to view all...

The information on this page is only about version 8.6.533 of Check Point Endpoint Security. For other Check Point Endpoint Security versions please click below:

...click to view all...
Quite a few files, folders and registry entries will be left behind when you remove Check Point Endpoint Security from your computer.

You should delete the folders below after you uninstall Check Point Endpoint Security:
  • C:\Program Files\CheckPoint\Endpoint Security

The files below remain on your disk when you remove Check Point Endpoint Security:
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\apputils.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\caCert.txt
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\ccore32.bin
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\CommonClientSettings.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\COMSecurityPS.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\comutils.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\config.bak
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\CP.UEPM.Console.FDE.Authentication.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cp_policy.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\CP_version_info.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cpbcrypt.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cpcert.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cpcryptutil.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cpda.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cplogluuid.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cplogrepository.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cpopenssl.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cpprng.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cppsm.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\CPRegSvr.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cpsrvis.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cpvinfo.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cpxerces_c.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\cryptocore.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\DAF_dsm.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\daf_logger.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\DafStub.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\DataStruct.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\DeviceAgentAPI.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\dlg.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\dnuninst.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\Encode.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\EP_CDT.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\EventUtils.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\findmsi.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\fwcpp.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\fwmonitor.def
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\iDAFServer.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\IDAFServerHostService.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\IItoolBox.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\KerberosClient.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\KerberosCommon.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\libcurl.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\lmx-MD-vc9.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\messaging.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\OS.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\PacketMon.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\preupg.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\ProdUtils.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\ProviderStore.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\PushOperationsClient.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\PushOperationsRepairHelper.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\regError.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\Resolve.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\sic.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\tcpip.def
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\UepmLogSchemaLib.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\UepmLogXformLib.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\bin\ZDx.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.11.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.12.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.13.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.15.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.16.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.17.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.19.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.20.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.21.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.22.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.23.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.24.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.25.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.26.xml
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\ca-bundle.crt
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\ClientUI.ini
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\cp_uploader.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\cpinfo.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\cpinfo.ini
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\CPInfoDll.dll
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\CpInfoPreboot.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\DA.ini
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\DS.ini
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\DumpSMBios.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\EPS.ini
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\fde.ini
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\ListInstalledApps.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\ListPartitions.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\lspol.exe
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\cpinfo\watchdog.ini
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Logs\Authentication.log
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Logs\cpda.log
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Logs\cptraylogic-dafstub-adaptor.log
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Logs\DAF_DSM.log
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Logs\fde_srv-dafcommunication-adaptor.log
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Logs\idafserver.log
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Logs\push-operations-client.log
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Storage\PAC_1_Pol_CPEPS_SID35_ID_afaf9dfd-ff9c-4bf4-8db0-79a90f20e5cb_content.cppol
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Storage\PAC_1_Pol_CPEPS_SID35_ID_afaf9dfd-ff9c-4bf4-8db0-79a90f20e5cb_info.cppol
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Storage\PAC_1_Pol_CPEPS_SID36_ID_1ca756df-7a36-4ee2-8900-1ec9f470c868_content.cppol
  • C:\Program Files\CheckPoint\Endpoint Security\Endpoint Common\Storage\PAC_1_Pol_CPEPS_SID36_ID_1ca756df-7a36-4ee2-8900-1ec9f470c868_info.cppol

Registry that is not removed:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D74EA14A1D2429A409C7FEA3C71E7812
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{A41AE47D-42D1-4A92-907C-EF3A7CE18721}

Registry values that are not removed from your computer:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D74EA14A1D2429A409C7FEA3C71E7812\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\CheckPoint\Endpoint Security\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\windows\Installer\{A41AE47D-42D1-4A92-907C-EF3A7CE18721}\
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Check Point Device Auxiliary Framework\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPDA\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPWD\ImagePath


How to erase Check Point Endpoint Security from your computer with Advanced Uninstaller PRO

Check Point Endpoint Security is a program by the software company Check Point Software Technologies Ltd.. Frequently, users choose to uninstall this application. Sometimes this is hard because performing this by hand requires some knowledge regarding removing Windows applications by hand. The best SIMPLE procedure to uninstall Check Point Endpoint Security is to use Advanced Uninstaller PRO. Here is how to do this:





1. If you don't have Advanced Uninstaller PRO on your PC, add it. This is good because Advanced Uninstaller PRO is one of the best uninstaller and all around tool to clean your computer.

DOWNLOAD NOW

  • visit Download Link
  • download the setup by clicking on the green DOWNLOAD button
  • set up Advanced Uninstaller PRO
2. Run Advanced Uninstaller PRO. It's recommended to take some time to admire the program's interface and number of functions available. Advanced Uninstaller PRO is a very useful package of tools.

3. Press the General Tools category
Go to General Tools


4. Activate the Uninstall Programs button
Go to Uninstall Programs


5. All the programs existing on your computer will be made available to you

6. Navigate the list of programs until you locate Check Point Endpoint Security or simply click the Search feature and type in "Check Point Endpoint Security". If it is installed on your PC the Check Point Endpoint Security program will be found automatically. When you select Check Point Endpoint Security in the list of programs, some information about the application is shown to you:


  • Safety rating (in the left lower corner). The star rating tells you the opinion other users have about Check Point Endpoint Security, ranging from "Highly recommended" to "Very dangerous".
  • Reviews by other users - Press the Read reviews button.
  • Details about the app you wish to remove, by clicking on the Properties button.
For instance you can see that for Check Point Endpoint Security:





  • The software company is: http://www.checkpoint.com
  • The uninstall string is: MsiExec.exe /X{D164EDAA-8098-46B7-8866-A8CA0022339F}
7. Click the Uninstall button. A window asking you to confirm will show up. Confirm the uninstall by clicking Uninstall. Advanced Uninstaller PRO will then remove Check Point Endpoint Security.
Uninstall Check Point Endpoint Security


8. After uninstalling Check Point Endpoint Security, Advanced Uninstaller PRO will offer to run a cleanup. Press Next to go ahead with the cleanup. All the items that belong Check Point Endpoint Security that have been left behind will be found and you will be asked if you want to delete them. By uninstalling Check Point Endpoint Security using Advanced Uninstaller PRO, you are assured that no Windows registry items, files or directories are left behind on your disk.

Your Windows PC will remain clean, speedy and able to take on new tasks.



Geographical user distribution

  • Windows 7 (6.1)
Software Application


Disclaimer

This page is not a recommendation to uninstall Check Point Endpoint Security by Check Point Software Technologies Ltd. from your PC, nor are we saying that Check Point Endpoint Security by Check Point Software Technologies Ltd. is not a good software application. This text simply contains detailed instructions on how to uninstall Check Point Endpoint Security in case you decide this is what you want to do. The information above contains registry and disk entries that Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' PCs.

2016-08-04 / Written by Daniel Statescu for Advanced Uninstaller PRO

follow @DanielStatescu
Last update on: 2016-08-04 08:33:08.320