Publishers

Check Point Endpoint Security Check Point Endpoint Security





How to uninstall Check Point Endpoint Security from your PC

Check Point Endpoint Security is a software application. This page holds details on how to uninstall it from your computer. It is made by Check Point Software Technologies Ltd.. You can read more on Check Point Software Technologies Ltd. or check for application updates here. Click on to get more data about Check Point Endpoint Security on Check Point Software Technologies Ltd.'s website. The program is often located in the C:\Program Files (x86)\CheckPoint\Endpoint Security folder. Take into account that this path can differ being determined by the user's decision. Check Point Endpoint Security's complete uninstall command line is MsiExec.exe /X{76343D07-86C8-4376-97DC-F54B158EF68A}. The application's main executable file is titled CheckConnectivity.exe and its approximative size is 1.64 MB (1717616 bytes).

The executable files below are installed along with Check Point Endpoint Security. They take about 75.77 MB (79450760 bytes) on disk.

  • epam_cli.exe (311.43 KB)
  • epam_svc.exe (1.77 MB)
  • handlekmsg.exe (56.00 KB)
  • ExtScanMon.exe (43.45 KB)
  • kavecscan.exe (287.45 KB)
  • kavehost.exe (424.45 KB)
  • TestMon.exe (141.95 KB)
  • TestScan.exe (159.45 KB)
  • TestScan.NET.exe (36.95 KB)
  • udinstaller64.exe (770.45 KB)
  • keepup2date8.exe (283.45 KB)
  • updsdksample.exe (32.45 KB)
  • updsdksample.net.exe (25.95 KB)
  • epab_svc.exe (478.98 KB)
  • ARCleaner.exe (128.60 KB)
  • cpefrcli.exe (467.10 KB)
  • EFRService.exe (3.21 MB)
  • avupdate.exe (70.98 KB)
  • CheckConnectivity.exe (1.64 MB)
  • cpda.exe (6.09 MB)
  • cppsm_tool.exe (188.69 KB)
  • CPRegSvr.exe (90.24 KB)
  • cpvinfo.exe (71.74 KB)
  • cp_InstPrep.exe (4.00 MB)
  • EPS_LogViewer.exe (390.74 KB)
  • EP_CDT.exe (416.48 KB)
  • fwcpp.exe (33.49 KB)
  • IDAFServerHostService.exe (652.10 KB)
  • PacketMon.exe (176.60 KB)
  • PushOperationsRepairHelper.exe (500.60 KB)
  • CRSValidator.exe (166.74 KB)
  • cpinfo.exe (518.19 KB)
  • cpinfoUI.exe (221.69 KB)
  • lspol.exe (48.00 KB)
  • cpinfo_uploader.exe (6.27 MB)
  • EPHealthMonitor.exe (954.69 KB)
  • tracelog.exe (83.24 KB)
  • tracelog.exe (90.74 KB)
  • nginx.exe (3.59 MB)
  • DAAW.exe (326.98 KB)
  • openmail.exe (37.48 KB)
  • trac.exe (1.80 MB)
  • TracCAPI.exe (1.04 MB)
  • TracSrvWrapper.exe (7.58 MB)
  • TrGUI.exe (17.30 MB)
  • update_config_tool.exe (472.48 KB)
  • vna_install64.exe (18.54 KB)
  • vna_utils.exe (71.65 KB)
  • VPN_ProxyServer.exe (102.77 KB)
  • RemediationManagerUI.exe (634.69 KB)
  • RemediationService.exe (18.19 KB)
  • CPSandBlastBroker.exe (51.21 KB)
  • MemDump.exe (19.00 KB)
  • TESvc.exe (135.10 KB)
  • WscHelper.exe (830.98 KB)
  • MemDump.exe (15.00 KB)
  • EPNetReplaceUpdater.exe (31.48 KB)
  • EPNetUpdater.exe (136.48 KB)
  • SBASignatureUpdater.exe (21.98 KB)
  • CPEPNotifier.exe (48.74 KB)
  • cptrayLogic.exe (20.48 KB)
  • cptrayUI.exe (659.98 KB)
  • logProcessor.exe (122.48 KB)
  • HotspotApplication.exe (13.48 KB)
  • wkhtmltopdf.exe (8.17 MB)
  • cptrayWUI.exe (937.98 KB)
  • UINotify.exe (20.48 KB)
  • EPWD.exe (499.60 KB)
  • EPWD_Tool.exe (67.60 KB)
...click to view all...

The information on this page is only about version 86.25.5060 of Check Point Endpoint Security. For more Check Point Endpoint Security versions please click below:

...click to view all...
When planning to uninstall Check Point Endpoint Security you should check if the following data is left behind on your PC.

Directories that were left behind:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security
  • C:\Users\%user%\AppData\Local\VS Revo Group\Revo Uninstaller Pro\BackUpsData\Check Point Endpoint Security-11072022-095507
  • C:\Users\%user%\AppData\Local\VS Revo Group\Revo Uninstaller Pro\BackUpsData\Check Point Endpoint Security-11072022-151924
  • C:\Users\%user%\AppData\Local\VS Revo Group\Revo Uninstaller Pro\HistoryData\Check Point Endpoint Security-11072022-101144

The files below remain on your disk by Check Point Endpoint Security's application uninstaller when you removed it:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\BladeEssentialsActors.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\CertUtil.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\DafDaAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\DataStruct_.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epab.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epab_svc.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabBotChecker.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCloudReporter.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCmi.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCmiUpdater.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabDafAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabMalwareLib.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabPMLibWrapper.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabRemediation.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabUIAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabURLInterceptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabURLInterceptorStub.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabUtils.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabWS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\ZdxAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\AntiMalwareAPI.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ac_facade.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ac_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\acassembler.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\agreements.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_core.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_facade_embedded.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_facade_server.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_patch_management.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_remote_client.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_remote_server.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_win_aux.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_control.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_control_prague.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_core.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_core_etw.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_core_legacy.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_core_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\application_categorizer.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\application_investigator.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\audio_processor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\avstream_monitor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\base64.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\bi_facade.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\bi_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\btdisk.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\btimages.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\buffer.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\cf_engines.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\cf_engines_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\cf_facade.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\CKAHComm.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ckahrule.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\CKAHUM.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Cleanup.reg
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Cleanup64.reg
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\clldr.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\com_antivirus.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\com_antivirus.reg
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\com_antivirus64.reg
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\config.esm
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\configuration.esm
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\content_filtering_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\crpthlpr.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\crypto_components.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\crypto_components_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\crypto_services.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\crypto_ssl.config
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\DataFormats-en.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\dblite.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\dmap.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\dns_client.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\dtreg.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ekasyswatch.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\EntAppControlTask.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\enterprise_application_control.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ExtScanMon.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\FileCategorizer.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\filesystem_services.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\format_recognizer.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\FsDrvPlg.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\fssync.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\fssync_s.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\hashmd5.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\hashsha1.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\hips.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\hips_perf_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\icudt58.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\icuin58.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\icuio58.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\icuuc58.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\inifile.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\DIFxAPI.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\kl1.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\kl1.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\kl1.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\klbg_uninstall.reg
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\klwtp.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\klwtp.inf

Generally the following registry data will not be removed:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\70D343678C68673479CD5FB451E86FA8
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{76343D07-86C8-4376-97DC-F54B158EF68A}

Open regedit.exe in order to remove the following values:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\70D343678C68673479CD5FB451E86FA8\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files (x86)\CheckPoint\Endpoint Security Agent\Endpoint Common\cpinfo\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files (x86)\CheckPoint\Endpoint Security Agent\Endpoint Common\Files_Storage\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files (x86)\CheckPoint\Endpoint Security Agent\Endpoint Common\nginx\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files (x86)\CheckPoint\Endpoint Security Agent\Endpoint Common\Work\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files (x86)\CheckPoint\Endpoint Security\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Windows\Installer\{76343D07-86C8-4376-97DC-F54B158EF68A}\
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Check Point Device Auxiliary Framework\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPDA\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPEFR\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EpabService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EpamService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPClientUIService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPWD\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ISWKL\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemediationService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TESvc\ImagePath


How to erase Check Point Endpoint Security from your PC with the help of Advanced Uninstaller PRO

Check Point Endpoint Security is an application marketed by the software company Check Point Software Technologies Ltd.. Frequently, computer users decide to remove this application. Sometimes this is hard because uninstalling this by hand requires some advanced knowledge regarding Windows program uninstallation. One of the best EASY action to remove Check Point Endpoint Security is to use Advanced Uninstaller PRO. Here are some detailed instructions about how to do this:





1. If you don't have Advanced Uninstaller PRO on your PC, add it. This is good because Advanced Uninstaller PRO is one of the best uninstaller and all around utility to clean your system.

DOWNLOAD NOW

  • visit Download Link
  • download the program by pressing the green DOWNLOAD button
  • install Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. It's recommended to take some time to get familiar with Advanced Uninstaller PRO's design and wealth of tools available. Advanced Uninstaller PRO is a powerful package of tools.

3. Click on the General Tools category
Go to General Tools


4. Activate the Uninstall Programs button
Go to Uninstall Programs


5. All the applications existing on your computer will be shown to you

6. Navigate the list of applications until you find Check Point Endpoint Security or simply activate the Search feature and type in "Check Point Endpoint Security". The Check Point Endpoint Security application will be found automatically. Notice that when you click Check Point Endpoint Security in the list , the following information about the application is shown to you:


  • Star rating (in the left lower corner). This explains the opinion other people have about Check Point Endpoint Security, ranging from "Highly recommended" to "Very dangerous".
  • Opinions by other people - Click on the Read reviews button.
  • Technical information about the application you want to remove, by pressing the Properties button.
For instance you can see that for Check Point Endpoint Security:





  • The software company is: http://www.checkpoint.com
  • The uninstall string is: MsiExec.exe /X{76343D07-86C8-4376-97DC-F54B158EF68A}
7. Press the Uninstall button. A confirmation window will come up. Confirm the uninstall by clicking the Uninstall button. Advanced Uninstaller PRO will automatically remove Check Point Endpoint Security.
Uninstall Check Point Endpoint Security


8. After removing Check Point Endpoint Security, Advanced Uninstaller PRO will offer to run an additional cleanup. Click Next to perform the cleanup. All the items of Check Point Endpoint Security which have been left behind will be detected and you will be able to delete them. By uninstalling Check Point Endpoint Security with Advanced Uninstaller PRO, you are assured that no registry entries, files or folders are left behind on your computer.

Your computer will remain clean, speedy and able to run without errors or problems.



Disclaimer

The text above is not a piece of advice to remove Check Point Endpoint Security by Check Point Software Technologies Ltd. from your computer, we are not saying that Check Point Endpoint Security by Check Point Software Technologies Ltd. is not a good application for your PC. This page simply contains detailed info on how to remove Check Point Endpoint Security supposing you want to. The information above contains registry and disk entries that Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' computers.

2022-05-28 / Written by Andreea Kartman for Advanced Uninstaller PRO

follow @DeeaKartman
Last update on: 2022-05-28 01:57:14.980