Publishers

Check Point Endpoint Security Check Point Endpoint Security





How to uninstall Check Point Endpoint Security from your PC

This web page contains thorough information on how to remove Check Point Endpoint Security for Windows. It is made by Check Point Software Technologies Ltd.. Check out here for more information on Check Point Software Technologies Ltd.. Please follow if you want to read more on Check Point Endpoint Security on Check Point Software Technologies Ltd.'s web page. Check Point Endpoint Security is typically set up in the C:\Program Files (x86)\CheckPoint\Endpoint Security directory, but this location can vary a lot depending on the user's decision while installing the program. The full command line for removing Check Point Endpoint Security is MsiExec.exe /X{281BDCD0-33F9-4800-9AB8-BB4EB6FE5589}. Keep in mind that if you will type this command in Start / Run Note you might be prompted for administrator rights. CheckConnectivity.exe is the Check Point Endpoint Security's main executable file and it occupies circa 1.64 MB (1718840 bytes) on disk.

The following executables are installed alongside Check Point Endpoint Security. They take about 108.11 MB (113364240 bytes) on disk.

  • chkdat32.exe (118.55 KB)
  • disknet.exe (38.30 MB)
  • InstallDeviceFilterDriver.exe (169.08 KB)
  • KAEon.exe (317.55 KB)
  • SelectUsersSrv.exe (33.08 KB)
  • ServiceRequest.exe (50.08 KB)
  • unlock.exe (1.53 MB)
  • unlock_ntfs.exe (21.13 MB)
  • MeDrInst.exe (189.30 KB)
  • CheckConnectivity.exe (1.64 MB)
  • cpda.exe (6.39 MB)
  • cppsm_tool.exe (199.80 KB)
  • CPRegSvr.exe (90.24 KB)
  • cpvinfo.exe (71.74 KB)
  • cp_InstPrep.exe (3.83 MB)
  • EpsInstallerTroubleshooter.exe (349.38 KB)
  • EPS_LogViewer.exe (390.74 KB)
  • EP_CDT.exe (416.48 KB)
  • fwcpp.exe (33.49 KB)
  • IDAFServerHostService.exe (729.30 KB)
  • PacketMon.exe (177.80 KB)
  • PushOperationsRepairHelper.exe (671.30 KB)
  • CRSValidator.exe (166.74 KB)
  • cpinfo.exe (519.30 KB)
  • CpInfoPreboot.exe (642.55 KB)
  • cpinfoUI.exe (222.80 KB)
  • DumpSMBios.exe (80.24 KB)
  • ListInstalledApps.exe (87.74 KB)
  • ListPartitions.exe (107.74 KB)
  • lspol.exe (48.00 KB)
  • cpinfo_uploader.exe (6.27 MB)
  • EPHealthMonitor.exe (954.69 KB)
  • tracelog.exe (84.80 KB)
  • tracelog.exe (92.30 KB)
  • nginx.exe (3.59 MB)
  • DriveSlavingUtilityCLI.exe (899.55 KB)
  • fdecontrol.exe (2.76 MB)
  • FDE_Drive_Slaving.exe (1.42 MB)
  • UseRec.exe (897.05 KB)
  • nemcontrol.exe (472.80 KB)
  • NEM_svc.exe (1.64 MB)
  • CPEPNotifier.exe (48.74 KB)
  • cptrayLogic.exe (23.33 KB)
  • cptrayUI.exe (663.83 KB)
  • logProcessor.exe (125.33 KB)
  • HotspotApplication.exe (16.33 KB)
  • wkhtmltopdf.exe (8.17 MB)
  • cptrayWUI.exe (967.80 KB)
  • UINotify.exe (22.80 KB)
  • EPWD.exe (522.80 KB)
  • EPWD_Tool.exe (68.80 KB)
...click to view all...

This web page is about Check Point Endpoint Security version 86.60.0185 alone. You can find below a few links to other Check Point Endpoint Security releases:

...click to view all...
If you are manually uninstalling Check Point Endpoint Security we recommend you to verify if the following data is left behind on your PC.

You should delete the folders below after you uninstall Check Point Endpoint Security:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security

The files below are left behind on your disk by Check Point Endpoint Security's application uninstaller when you removed it:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\BladeEssentialsActors.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\CertUtil.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\DafDaAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\DataStruct_.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epab.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epab_svc.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabBotChecker.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCloudReporter.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCmi.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCmiUpdater.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabDafAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabMalwareLib.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabPMLibWrapper.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabRemediation.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabUIAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabURLInterceptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabURLInterceptorStub.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabUtils.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabWS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\ZdxAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\BackupDriver\cpbak.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\BackupDriver\cpbak.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\BackupDriver\cpbak.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\7350
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\AntiRansomware.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\ARCleaner.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\AssemblyResolver.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\BackupAndRestoration.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\CP_AmsiProvider32.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\CP_AmsiProvider64.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpbaklib.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpdevmon64.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpefrcli.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpepmon.cat
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpepmon.inf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpepmon.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphnt32.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphnt64.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\CPHook.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphusr32.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphusr64.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\damagesConfig.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\DataCollection.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\DCPolicy.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\DCPolicy_ZA.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\devmonapi.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\Dia2Lib.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRGenConf
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_AR.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_ENV.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_FLT.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_INJECT.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_IOCTL.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_NET.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_PS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_REG.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_REGDETECT.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_SCRIPTS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRService.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\FltSalConfig.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\HarmonyAddin.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\HarmonyAddin.vsto
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\Camouflage.out.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\Camouflage.xml.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\HashCopy.out.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\HashCopy.xml.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\MLConfig.xml.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\mldata.zip
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000000.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000000_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000001.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000001_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000002.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000002_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000003.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000003_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000004.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000004_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000005.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000005_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000006.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000006_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000007.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000007_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000008.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000008_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000009.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000009_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000010.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000010_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000011.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000011_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000012.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000012_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000013.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000013_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000014.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000014_info.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000016.json.tmp
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000016_info.json.tmp

Registry keys:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0DCDB1829F330084A98BBBE46BEF5598
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{281BDCD0-33F9-4800-9AB8-BB4EB6FE5589}

Use regedit.exe to delete the following additional registry values from the Windows Registry:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0DCDB1829F330084A98BBBE46BEF5598\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files (x86)\CheckPoint\Endpoint Security\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Windows\Installer\{281BDCD0-33F9-4800-9AB8-BB4EB6FE5589}\
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Check Point Device Auxiliary Framework\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPDA\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\cpdevmon\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPEFR\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EpabService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPClientUIService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPWD\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ISWKL\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemediationService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TESvc\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TracSrvWrapper\ImagePath


How to remove Check Point Endpoint Security from your computer with Advanced Uninstaller PRO

Check Point Endpoint Security is an application by Check Point Software Technologies Ltd.. Some computer users decide to remove it. Sometimes this can be difficult because deleting this manually takes some knowledge regarding Windows program uninstallation. The best EASY approach to remove Check Point Endpoint Security is to use Advanced Uninstaller PRO. Take the following steps on how to do this:





1. If you don't have Advanced Uninstaller PRO on your system, install it. This is good because Advanced Uninstaller PRO is an efficient uninstaller and all around utility to optimize your PC.

DOWNLOAD NOW

  • go to Download Link
  • download the program by pressing the green DOWNLOAD button
  • install Advanced Uninstaller PRO
2. Run Advanced Uninstaller PRO. Take some time to get familiar with the program's interface and number of tools available. Advanced Uninstaller PRO is a very useful Windows tool.

3. Press the General Tools category
Go to General Tools


4. Click on the Uninstall Programs feature
Go to Uninstall Programs


5. A list of the programs installed on your computer will be made available to you

6. Scroll the list of programs until you find Check Point Endpoint Security or simply activate the Search feature and type in "Check Point Endpoint Security". If it is installed on your PC the Check Point Endpoint Security application will be found automatically. After you click Check Point Endpoint Security in the list , the following information about the application is available to you:


  • Safety rating (in the lower left corner). The star rating explains the opinion other users have about Check Point Endpoint Security, from "Highly recommended" to "Very dangerous".
  • Opinions by other users - Press the Read reviews button.
  • Technical information about the application you are about to remove, by pressing the Properties button.
For example you can see that for Check Point Endpoint Security:





  • The web site of the application is: http://www.checkpoint.com
  • The uninstall string is: MsiExec.exe /X{281BDCD0-33F9-4800-9AB8-BB4EB6FE5589}
7. Click the Uninstall button. A confirmation dialog will show up. accept the uninstall by clicking Uninstall. Advanced Uninstaller PRO will uninstall Check Point Endpoint Security.
Uninstall Check Point Endpoint Security


8. After uninstalling Check Point Endpoint Security, Advanced Uninstaller PRO will offer to run a cleanup. Click Next to start the cleanup. All the items of Check Point Endpoint Security which have been left behind will be found and you will be able to delete them. By uninstalling Check Point Endpoint Security with Advanced Uninstaller PRO, you are assured that no registry entries, files or directories are left behind on your PC.

Your PC will remain clean, speedy and ready to run without errors or problems.



Disclaimer

This page is not a recommendation to uninstall Check Point Endpoint Security by Check Point Software Technologies Ltd. from your PC, nor are we saying that Check Point Endpoint Security by Check Point Software Technologies Ltd. is not a good application. This page only contains detailed instructions on how to uninstall Check Point Endpoint Security in case you decide this is what you want to do. Here you can find registry and disk entries that Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' computers.

2022-11-28 / Written by Andreea Kartman for Advanced Uninstaller PRO

follow @DeeaKartman
Last update on: 2022-11-28 13:37:45.760