Publishers

Check Point Endpoint Security Check Point Endpoint Security





A guide to uninstall Check Point Endpoint Security from your PC

This web page is about Check Point Endpoint Security for Windows. Here you can find details on how to uninstall it from your PC. It is written by Check Point Software Technologies Ltd.. Take a look here where you can get more info on Check Point Software Technologies Ltd.. Please follow if you want to read more on Check Point Endpoint Security on Check Point Software Technologies Ltd.'s website. Check Point Endpoint Security is normally installed in the C:\Program Files (x86)\CheckPoint\Endpoint Security Agent folder, but this location may differ a lot depending on the user's decision while installing the application. The entire uninstall command line for Check Point Endpoint Security is MsiExec.exe /X{4BF3628E-462C-4740-997C-9AC639DB2E21}. cpda.exe is the Check Point Endpoint Security's primary executable file and it occupies around 1.73 MB (1813784 bytes) on disk.

The executable files below are installed together with Check Point Endpoint Security. They occupy about 8.40 MB (8806264 bytes) on disk.

  • cpda.exe (1.73 MB)
  • CPRegSvr.exe (135.66 KB)
  • cpvinfo.exe (63.36 KB)
  • dlg.exe (191.27 KB)
  • dnuninst.exe (173.24 KB)
  • IDAFServerHostService.exe (217.27 KB)
  • PushOperationsRepairHelper.exe (90.77 KB)
  • cpinfo.exe (163.77 KB)
  • lspol.exe (48.00 KB)
  • cpinfo_uploader.exe (5.61 MB)
...click to view all...

The information on this page is only about version 80.82.4063 of Check Point Endpoint Security. For more Check Point Endpoint Security versions please click below:

...click to view all...
Check Point Endpoint Security has the habit of leaving behind some leftovers.

Folders remaining:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security

Files remaining:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\BladeEssentialsActors.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\BladeFoundation.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\CloudServices.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\ComUtils.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\cpbcrypt.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\cpsys.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\DafDaAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\DataStruct.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epab.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epab_svc.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabBotChecker.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCloudReporter.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCmi.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCmiUpdater.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabDafAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabMD5Reporter.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabRemediation.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabTEReporter.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabUIAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabURLInterceptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabURLInterceptorStub.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabUtils.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabWS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\Epilogue.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\kiss_apps.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\OS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\ProdUtils.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\Reg.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\Resolve.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\TECommon.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\TECommonExport.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\ZdxAdaptor.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-console-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-datetime-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-debug-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-errorhandling-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-file-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-file-l1-2-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-file-l2-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-handle-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-heap-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-interlocked-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-libraryloader-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-localization-l1-2-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-memory-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-namedpipe-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-processenvironment-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-processthreads-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-processthreads-l1-1-1.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-profile-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-rtlsupport-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-string-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-synch-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-synch-l1-2-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-sysinfo-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-timezone-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-core-util-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-conio-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-convert-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-environment-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-filesystem-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-heap-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-locale-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-math-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-multibyte-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-private-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-process-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-runtime-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-stdio-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-string-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-time-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\api-ms-win-crt-utility-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ac_facade.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ac_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\acassembler.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\ahids.ppl
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_core.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_facade_embedded.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_facade_server.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_meta.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_patch_management.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_remote_client.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_remote_server.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\am_win_aux.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\antispam.ppl
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-console-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-datetime-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-debug-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-errorhandling-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-file-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-file-l1-2-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-file-l2-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-handle-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-heap-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-interlocked-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-libraryloader-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-localization-l1-2-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-memory-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-namedpipe-l1-1-0.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\api-ms-win-core-processenvironment-l1-1-0.dll

Usually the following registry data will not be uninstalled:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\5A00ED4DC606A4147B21B85886C2E004
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{D4DE00A5-606C-414A-B712-8B85682C0E40}

Open regedit.exe in order to remove the following values:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\5A00ED4DC606A4147B21B85886C2E004\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files (x86)\CheckPoint\Endpoint Security\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Windows\Installer\{D4DE00A5-606C-414A-B712-8B85682C0E40}\
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Check Point Device Auxiliary Framework\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPCompliance\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPDA\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPEFR\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EpabService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EpamService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPClientUIService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPWD\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ISWKL\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemediationService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TESvc\ImagePath


A way to uninstall Check Point Endpoint Security from your computer using Advanced Uninstaller PRO

Check Point Endpoint Security is an application by Check Point Software Technologies Ltd.. Frequently, computer users choose to remove this application. Sometimes this is difficult because uninstalling this manually takes some skill regarding removing Windows programs manually. The best EASY solution to remove Check Point Endpoint Security is to use Advanced Uninstaller PRO. Take the following steps on how to do this:





1. If you don't have Advanced Uninstaller PRO on your system, install it. This is good because Advanced Uninstaller PRO is a very potent uninstaller and all around tool to clean your system.

DOWNLOAD NOW

  • go to Download Link
  • download the program by clicking on the DOWNLOAD button
  • install Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. It's recommended to take your time to get familiar with Advanced Uninstaller PRO's interface and number of functions available. Advanced Uninstaller PRO is a very useful package of tools.

3. Click on the General Tools button
Go to General Tools


4. Press the Uninstall Programs tool
Go to Uninstall Programs


5. A list of the applications existing on the PC will be made available to you

6. Scroll the list of applications until you find Check Point Endpoint Security or simply click the Search field and type in "Check Point Endpoint Security". If it is installed on your PC the Check Point Endpoint Security program will be found very quickly. Notice that when you select Check Point Endpoint Security in the list of applications, the following data regarding the application is made available to you:


  • Safety rating (in the lower left corner). The star rating tells you the opinion other people have regarding Check Point Endpoint Security, ranging from "Highly recommended" to "Very dangerous".
  • Opinions by other people - Click on the Read reviews button.
  • Technical information regarding the application you want to uninstall, by clicking on the Properties button.
For instance you can see that for Check Point Endpoint Security:





  • The web site of the application is: http://www.checkpoint.com
  • The uninstall string is: MsiExec.exe /X{4BF3628E-462C-4740-997C-9AC639DB2E21}
7. Click the Uninstall button. A confirmation dialog will appear. accept the uninstall by clicking the Uninstall button. Advanced Uninstaller PRO will automatically remove Check Point Endpoint Security.
Uninstall Check Point Endpoint Security


8. After uninstalling Check Point Endpoint Security, Advanced Uninstaller PRO will offer to run an additional cleanup. Click Next to go ahead with the cleanup. All the items of Check Point Endpoint Security that have been left behind will be found and you will be able to delete them. By removing Check Point Endpoint Security using Advanced Uninstaller PRO, you can be sure that no registry items, files or folders are left behind on your computer.

Your computer will remain clean, speedy and able to take on new tasks.



Disclaimer

This page is not a recommendation to uninstall Check Point Endpoint Security by Check Point Software Technologies Ltd. from your computer, nor are we saying that Check Point Endpoint Security by Check Point Software Technologies Ltd. is not a good software application. This page simply contains detailed instructions on how to uninstall Check Point Endpoint Security supposing you decide this is what you want to do. Here you can find registry and disk entries that Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' computers.

2018-04-19 / Written by Andreea Kartman for Advanced Uninstaller PRO

follow @DeeaKartman
Last update on: 2018-04-18 23:50:50.080