Publishers

Application Check Point Endpoint Security





How to uninstall Check Point Endpoint Security from your computer

You can find below detailed information on how to remove Check Point Endpoint Security for Windows. The Windows version was created by Check Point Software Technologies Ltd.. Take a look here where you can read more on Check Point Software Technologies Ltd.. Please open if you want to read more on Check Point Endpoint Security on Check Point Software Technologies Ltd.'s website. Usually the Check Point Endpoint Security application is installed in the C:\Program Files (x86)\CheckPoint\Endpoint Security directory, depending on the user's option during setup. The full command line for uninstalling Check Point Endpoint Security is MsiExec.exe /X{AB40B2B0-7840-4822-96BD-454B352962C7}. Note that if you will type this command in Start / Run Note you may be prompted for administrator rights. ExtScanMon.exe is the Check Point Endpoint Security's main executable file and it takes around 44.80 KB (45880 bytes) on disk.

The executable files below are part of Check Point Endpoint Security. They take about 117.62 MB (123334215 bytes) on disk.

  • epam_cli.exe (290.20 KB)
  • epam_svc.exe (1.80 MB)
  • handlekmsg.exe (56.00 KB)
  • ExtScanMon.exe (44.80 KB)
  • kavecscan.exe (292.38 KB)
  • kavehost.exe (444.55 KB)
  • TestMon.exe (144.21 KB)
  • TestScan.exe (162.01 KB)
  • TestScan.NET.exe (39.18 KB)
  • udinstaller64.exe (741.33 KB)
  • keepup2date8.exe (287.20 KB)
  • updsdksample.exe (34.68 KB)
  • updsdksample.net.exe (27.99 KB)
  • Compliance.exe (2.25 MB)
  • chkdat32.exe (118.63 KB)
  • disknet.exe (30.94 MB)
  • InstallDeviceFilterDriver.exe (166.24 KB)
  • KAEon.exe (317.63 KB)
  • SelectUsersSrv.exe (30.24 KB)
  • ServiceRequest.exe (46.74 KB)
  • unlock.exe (1.54 MB)
  • unlock_ntfs.exe (20.80 MB)
  • MeDrInst.exe (187.74 KB)
  • avupdate.exe (71.74 KB)
  • cpda.exe (3.63 MB)
  • cppsm_tool.exe (189.24 KB)
  • CPRegSvr.exe (90.24 KB)
  • cpvinfo.exe (71.74 KB)
  • cp_InstPrep.exe (2.27 MB)
  • dlg.exe (211.74 KB)
  • EPS_LogViewer.exe (390.74 KB)
  • EP_CDT.exe (113.74 KB)
  • fwcpp.exe (33.49 KB)
  • IDAFServerHostService.exe (593.74 KB)
  • PacketMon.exe (176.24 KB)
  • PushOperationsRepairHelper.exe (365.74 KB)
  • CRSValidator.exe (166.74 KB)
  • cpinfo.exe (517.74 KB)
  • cpinfoUI.exe (219.24 KB)
  • lspol.exe (48.00 KB)
  • cpinfo_uploader.exe (6.27 MB)
  • tracelog.exe (83.24 KB)
  • tracelog.exe (90.74 KB)
  • DAAW.exe (323.67 KB)
  • openmail.exe (37.74 KB)
  • trac.exe (1.79 MB)
  • TracCAPI.exe (1.04 MB)
  • TracSrvWrapper.exe (7.51 MB)
  • TrGUI.exe (17.30 MB)
  • update_config_tool.exe (451.17 KB)
  • vna_install64.exe (18.54 KB)
  • vna_utils.exe (71.65 KB)
  • VPN_ProxyServer.exe (102.77 KB)
  • CPEPNotifier.exe (48.74 KB)
  • cptrayLogic.exe (20.74 KB)
  • cptrayUI.exe (659.74 KB)
  • logProcessor.exe (123.24 KB)
  • HotspotApplication.exe (14.24 KB)
  • wkhtmltopdf.exe (8.17 MB)
  • cptrayWUI.exe (76.74 KB)
  • html.exe (3.17 MB)
  • EPWD.exe (495.74 KB)
  • EPWD_Tool.exe (67.24 KB)
...click to view all...

This web page is about Check Point Endpoint Security version 84.30.6638 alone. You can find here a few links to other Check Point Endpoint Security versions:

...click to view all...
After the uninstall process, the application leaves leftovers on the PC. Some of these are shown below.

Directories left on disk:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security

The files below remain on your disk when you remove Check Point Endpoint Security:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\AntiMalwareAPI.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ac_facade.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ac_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\acassembler.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\agreements.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_core.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_facade_embedded.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_facade_server.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_patch_management.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_remote_client.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_remote_server.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_win_aux.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_control.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_control_prague.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_core.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_core_etw.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_core_legacy.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\app_core_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\application_categorizer.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\application_investigator.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\audio_processor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\avstream_monitor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\base64.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\bi_facade.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\bi_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\btdisk.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\btimages.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\buffer.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\cf_engines.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\cf_engines_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\cf_facade.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\CKAHComm.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ckahrule.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\CKAHUM.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Cleanup.reg
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Cleanup64.reg
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\clldr.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\config.esm
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\configuration.esm
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\content_filtering_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\crpthlpr.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\crypto_components.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\crypto_components_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\crypto_services.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\crypto_ssl.config
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\DataFormats-en.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\dblite.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\dmap.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\dns_client.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\dtreg.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ekasyswatch.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\EntAppControlTask.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\enterprise_application_control.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ExtScanMon.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\FileCategorizer.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\filesystem_services.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\format_recognizer.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\FsDrvPlg.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\fssync.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\fssync_s.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\hashmd5.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\hashsha1.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\hips.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\hips_perf_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\icudt58.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\icuin58.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\icuio58.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\icuuc58.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\inifile.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\DIFxAPI.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\kl1.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\kl1.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\kl1.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\klbg_uninstall.reg
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\klwtp.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\klwtp.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\klwtp.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\Win8\klelam.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\Win8\klelam.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\kl1\x64\Win8\klelam.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klbackupdisk.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klbackupdisk.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klbackupdisk.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klbackupflt.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klbackupflt.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klbackupflt.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klflt.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klflt.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klflt.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klgse.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klgse.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klgse.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klhk.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klhk.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klhk.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klhkum.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klifsdk.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klifsdk.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\Install\instdrivers\mklif\fre_wlh_amd64\klifsdk.sys

Registry that is not uninstalled:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0B2B04BA0487228469DB54B45392267C
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{AB40B2B0-7840-4822-96BD-454B352962C7}

Use regedit.exe to remove the following additional values from the Windows Registry:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0B2B04BA0487228469DB54B45392267C\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files (x86)\CheckPoint\Endpoint Security\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Windows\Installer\{AB40B2B0-7840-4822-96BD-454B352962C7}\
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Check Point Device Auxiliary Framework\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPCompliance\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPDA\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DisknetClient\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EpamService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPClientUIService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPWD\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TracSrvWrapper\ImagePath


A way to remove Check Point Endpoint Security from your PC with the help of Advanced Uninstaller PRO

Check Point Endpoint Security is a program marketed by Check Point Software Technologies Ltd.. Some users try to erase it. Sometimes this is efortful because performing this by hand requires some advanced knowledge regarding removing Windows applications by hand. One of the best SIMPLE solution to erase Check Point Endpoint Security is to use Advanced Uninstaller PRO. Take the following steps on how to do this:





1. If you don't have Advanced Uninstaller PRO on your Windows system, add it. This is good because Advanced Uninstaller PRO is the best uninstaller and general utility to optimize your Windows system.

DOWNLOAD NOW

  • navigate to Download Link
  • download the program by pressing the DOWNLOAD button
  • install Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. Take your time to get familiar with the program's interface and wealth of functions available. Advanced Uninstaller PRO is a powerful Windows optimizer.

3. Click on the General Tools category
Go to General Tools


4. Activate the Uninstall Programs feature
Go to Uninstall Programs


5. All the programs existing on the PC will be made available to you

6. Navigate the list of programs until you locate Check Point Endpoint Security or simply activate the Search feature and type in "Check Point Endpoint Security". If it exists on your system the Check Point Endpoint Security application will be found very quickly. Notice that after you click Check Point Endpoint Security in the list , some data regarding the program is made available to you:


  • Safety rating (in the lower left corner). This tells you the opinion other users have regarding Check Point Endpoint Security, ranging from "Highly recommended" to "Very dangerous".
  • Opinions by other users - Click on the Read reviews button.
  • Technical information regarding the application you are about to remove, by pressing the Properties button.
For example you can see that for Check Point Endpoint Security:





  • The publisher is: http://www.checkpoint.com
  • The uninstall string is: MsiExec.exe /X{AB40B2B0-7840-4822-96BD-454B352962C7}
7. Click the Uninstall button. A confirmation dialog will show up. accept the removal by clicking the Uninstall button. Advanced Uninstaller PRO will then uninstall Check Point Endpoint Security.
Uninstall Check Point Endpoint Security


8. After removing Check Point Endpoint Security, Advanced Uninstaller PRO will offer to run an additional cleanup. Press Next to perform the cleanup. All the items of Check Point Endpoint Security which have been left behind will be detected and you will be able to delete them. By removing Check Point Endpoint Security using Advanced Uninstaller PRO, you can be sure that no Windows registry entries, files or directories are left behind on your system.

Your Windows PC will remain clean, speedy and able to take on new tasks.



Disclaimer

This page is not a piece of advice to uninstall Check Point Endpoint Security by Check Point Software Technologies Ltd. from your PC, nor are we saying that Check Point Endpoint Security by Check Point Software Technologies Ltd. is not a good software application. This page simply contains detailed info on how to uninstall Check Point Endpoint Security in case you want to. Here you can find registry and disk entries that other software left behind and Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' computers.

2021-10-11 / Written by Daniel Statescu for Advanced Uninstaller PRO

follow @DanielStatescu
Last update on: 2021-10-11 18:45:26.003