Publishers

Check Point Endpoint Security Check Point Endpoint Security





How to uninstall Check Point Endpoint Security from your system

Check Point Endpoint Security is a Windows application. Read more about how to uninstall it from your computer. The Windows version was developed by Check Point Software Technologies Ltd.. Check out here where you can find out more on Check Point Software Technologies Ltd.. Click on to get more info about Check Point Endpoint Security on Check Point Software Technologies Ltd.'s website. Usually the Check Point Endpoint Security application is installed in the C:\Program Files (x86)\CheckPoint\Endpoint Security folder, depending on the user's option during setup. The entire uninstall command line for Check Point Endpoint Security is MsiExec.exe /X{42AE15B4-949A-464B-A9C6-73F79C5FA31B}. epab_svc.exe is the Check Point Endpoint Security's main executable file and it takes approximately 478.24 KB (489720 bytes) on disk.

The following executables are installed alongside Check Point Endpoint Security. They occupy about 72.77 MB (76303360 bytes) on disk.

  • epab_svc.exe (478.24 KB)
  • Compliance.exe (2.25 MB)
  • ARCleaner.exe (125.24 KB)
  • cpefrcli.exe (465.74 KB)
  • EFRService.exe (3.03 MB)
  • cpda.exe (3.63 MB)
  • cppsm_tool.exe (189.24 KB)
  • CPRegSvr.exe (90.24 KB)
  • cpvinfo.exe (71.74 KB)
  • cp_InstPrep.exe (2.27 MB)
  • dlg.exe (211.74 KB)
  • EPS_LogViewer.exe (390.74 KB)
  • EP_CDT.exe (113.74 KB)
  • fwcpp.exe (33.49 KB)
  • IDAFServerHostService.exe (593.74 KB)
  • PacketMon.exe (176.24 KB)
  • PushOperationsRepairHelper.exe (365.74 KB)
  • CRSValidator.exe (166.74 KB)
  • cpinfo.exe (517.74 KB)
  • cpinfoUI.exe (219.24 KB)
  • lspol.exe (48.00 KB)
  • cpinfo_uploader.exe (6.27 MB)
  • tracelog.exe (83.24 KB)
  • tracelog.exe (90.74 KB)
  • DAAW.exe (322.74 KB)
  • openmail.exe (37.74 KB)
  • trac.exe (1.79 MB)
  • TracCAPI.exe (1.04 MB)
  • TracSrvWrapper.exe (7.50 MB)
  • TrGUI.exe (17.30 MB)
  • update_config_tool.exe (450.74 KB)
  • vna_install64.exe (18.54 KB)
  • vna_utils.exe (71.65 KB)
  • VPN_ProxyServer.exe (102.77 KB)
  • RemediationManagerUI.exe (640.24 KB)
  • RemediationService.exe (17.74 KB)
  • CPSandBlastBroker.exe (50.77 KB)
  • MemDump.exe (19.00 KB)
  • TESvc.exe (132.74 KB)
  • WscHelper.exe (126.76 KB)
  • Scanner.exe (15.63 KB)
  • ScannerUI.exe (67.63 KB)
  • MemDump.exe (15.00 KB)
  • EPNetReplaceUpdater.exe (31.24 KB)
  • EPNetUpdater.exe (127.74 KB)
  • SBASignatureUpdater.exe (22.74 KB)
  • CPEPNotifier.exe (48.74 KB)
  • cptrayLogic.exe (20.74 KB)
  • cptrayUI.exe (659.74 KB)
  • logProcessor.exe (123.24 KB)
  • HotspotApplication.exe (14.24 KB)
  • wkhtmltopdf.exe (8.17 MB)
  • ucp_eps.exe (11.12 MB)
  • TIF.exe (187.36 KB)
  • Umutil.exe (43.36 KB)
  • ucp.exe (103.54 KB)
  • php-cgi.exe (59.02 KB)
  • php-win.exe (25.00 KB)
  • php.exe (58.00 KB)
  • EPWD.exe (495.74 KB)
  • EPWD_Tool.exe (67.24 KB)
...click to view all...

The information on this page is only about version 84.30.6614 of Check Point Endpoint Security. For more Check Point Endpoint Security versions please click below:

...click to view all...
Some files, folders and registry data will be left behind when you want to remove Check Point Endpoint Security from your PC.

Folders found on disk after you uninstall Check Point Endpoint Security from your computer:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security

Files remaining:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\BladeEssentialsActors.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\DafDaAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\DataStruct.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epab.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epab_svc.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabBotChecker.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCloudReporter.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCmi.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCmiUpdater.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabDafAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabMalwareLib.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabPMLibWrapper.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabRemediation.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabUIAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabURLInterceptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabURLInterceptorStub.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabUtils.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabWS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\ZdxAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\BackupDriver\cpbak.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\BackupDriver\cpbak.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\BackupDriver\cpbak.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Compliance\Compliance.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Compliance\icslta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\AntiRansomware.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\ARCleaner.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\AssemblyResolver.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\BackupAndRestoration.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\CP_AmsiProvider32.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\CP_AmsiProvider64.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpbaklib.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpefrcli.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpepmon.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpepmon.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpepmon.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphnt32.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphnt64.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\CPHook.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphusr32.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphusr64.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\damagesConfig.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\DataCollection.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\DCPolicy.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\DCPolicy_ZA.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\Dia2Lib.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRGenConf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_AR.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_ENV.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_FLT.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_INJECT.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_NET.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_PS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_REG.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_REGDETECT.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_SCRIPTS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRService.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\FltSalConfig.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\Camouflage.out.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\Camouflage.xml.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\HashCopy.out.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\HashCopy.xml.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\MLConfig.xml.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\mldata.zip
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000000.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000000_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000001.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000001_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000002.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000002_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000003.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000003_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000004.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000004_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000005.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000005_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000006.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000006_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000007.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000007_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000008.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000008_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000009.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000009_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000010.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000010_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000011.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000011_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000012.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000012_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000013.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000013_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000014.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000014_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000016.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000016_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000116.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000116_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000117.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000117_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000121.json.tmp

Use regedit.exe to manually remove from the Windows Registry the data below:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4B51EA24A949B4649A6C377FC9F53AB1
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{42AE15B4-949A-464B-A9C6-73F79C5FA31B}

Supplementary values that are not cleaned:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4B51EA24A949B4649A6C377FC9F53AB1\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files (x86)\CheckPoint\Endpoint Security\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\WINDOWS\Installer\{42AE15B4-949A-464B-A9C6-73F79C5FA31B}\
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Check Point Device Auxiliary Framework\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPCompliance\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPDA\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPEFR\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EpabService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPClientUIService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPWD\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\gwcc\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ISWKL\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemediationService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TESvc\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TracSrvWrapper\ImagePath


A way to delete Check Point Endpoint Security from your computer using Advanced Uninstaller PRO

Check Point Endpoint Security is a program released by Check Point Software Technologies Ltd.. Frequently, computer users try to uninstall this program. Sometimes this is efortful because uninstalling this manually takes some advanced knowledge related to PCs. The best EASY procedure to uninstall Check Point Endpoint Security is to use Advanced Uninstaller PRO. Take the following steps on how to do this:





1. If you don't have Advanced Uninstaller PRO already installed on your Windows system, add it. This is good because Advanced Uninstaller PRO is a very potent uninstaller and all around tool to optimize your Windows system.

DOWNLOAD NOW

  • go to Download Link
  • download the program by clicking on the DOWNLOAD button
  • set up Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. It's recommended to take your time to get familiar with the program's design and wealth of features available. Advanced Uninstaller PRO is a powerful system optimizer.

3. Click on the General Tools button
Go to General Tools


4. Activate the Uninstall Programs feature
Go to Uninstall Programs


5. All the programs installed on the PC will appear

6. Scroll the list of programs until you locate Check Point Endpoint Security or simply click the Search field and type in "Check Point Endpoint Security". If it is installed on your PC the Check Point Endpoint Security program will be found automatically. After you click Check Point Endpoint Security in the list , the following information about the program is made available to you:


  • Star rating (in the lower left corner). The star rating tells you the opinion other people have about Check Point Endpoint Security, from "Highly recommended" to "Very dangerous".
  • Reviews by other people - Click on the Read reviews button.
  • Technical information about the application you want to remove, by clicking on the Properties button.
For example you can see that for Check Point Endpoint Security:





  • The web site of the application is: http://www.checkpoint.com
  • The uninstall string is: MsiExec.exe /X{42AE15B4-949A-464B-A9C6-73F79C5FA31B}
7. Click the Uninstall button. A window asking you to confirm will show up. accept the removal by clicking Uninstall. Advanced Uninstaller PRO will then uninstall Check Point Endpoint Security.
Uninstall Check Point Endpoint Security


8. After uninstalling Check Point Endpoint Security, Advanced Uninstaller PRO will ask you to run an additional cleanup. Press Next to go ahead with the cleanup. All the items that belong Check Point Endpoint Security which have been left behind will be found and you will be asked if you want to delete them. By uninstalling Check Point Endpoint Security using Advanced Uninstaller PRO, you can be sure that no registry items, files or folders are left behind on your computer.

Your system will remain clean, speedy and able to run without errors or problems.



Disclaimer

The text above is not a recommendation to uninstall Check Point Endpoint Security by Check Point Software Technologies Ltd. from your computer, we are not saying that Check Point Endpoint Security by Check Point Software Technologies Ltd. is not a good software application. This page simply contains detailed info on how to uninstall Check Point Endpoint Security supposing you want to. The information above contains registry and disk entries that our application Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' PCs.

2021-02-17 / Written by Andreea Kartman for Advanced Uninstaller PRO

follow @DeeaKartman
Last update on: 2021-02-17 07:46:45.673