Check Point Endpoint Security
A guide to uninstall Check Point Endpoint Security from your PC
Check Point Endpoint Security is a Windows application. Read below about how to uninstall it from your PC. It is produced by
Check Point Software Technologies Ltd.. Go over
here for more details on Check Point Software Technologies Ltd.. You can get more details related to Check Point Endpoint Security at
http://www.checkpoint.com. The program is often found in the C:\Program Files (x86)\CheckPoint\Endpoint Security folder. Keep in mind that this path can differ depending on the user's decision. MsiExec.exe /X{C574276D-5A8F-4666-B41F-CA017398FA72} is the full command line if you want to remove Check Point Endpoint Security. CheckConnectivity.exe is the programs's main file and it takes close to 1.64 MB (1720080 bytes) on disk.
Check Point Endpoint Security installs the following the executables on your PC, taking about 46.72 MB (
48984592 bytes) on disk.
- epab_svc.exe (505.30 KB)
- ARCleaner.exe (138.44 KB)
- cpefrcli.exe (475.44 KB)
- EFRService.exe (3.44 MB)
- IntelTdtHost.exe (1.81 MB)
- install_tdt_driver.exe (626.81 KB)
- CheckConnectivity.exe (1.64 MB)
- cpda.exe (6.77 MB)
- cppsm_tool.exe (231.44 KB)
- CPRegSvr.exe (90.24 KB)
- cpvinfo.exe (71.74 KB)
- cp_InstPrep.exe (4.10 MB)
- EPS_LogViewer.exe (390.74 KB)
- epwirfix.exe (50.81 KB)
- EP_CDT.exe (416.48 KB)
- fwcpp.exe (33.49 KB)
- hepctrl.exe (56.56 KB)
- IDAFServerHostService.exe (781.44 KB)
- PacketMon.exe (178.94 KB)
- PushOperationsRepairHelper.exe (617.94 KB)
- CRSValidator.exe (166.74 KB)
- cpinfo.exe (544.44 KB)
- cpinfoUI.exe (223.94 KB)
- cpinfo_uploader.exe (6.27 MB)
- EPHealthMonitor.exe (954.69 KB)
- tracelog.exe (85.94 KB)
- tracelog.exe (93.44 KB)
- nginx.exe (3.59 MB)
- tlsclient.exe (35.56 KB)
- tlslog.exe (18.06 KB)
- RemediationManagerUI.exe (646.94 KB)
- CPSandBlastBroker.exe (51.21 KB)
- MemDump.exe (27.80 KB)
- TESvc.exe (138.44 KB)
- WscHelper.exe (837.52 KB)
- MemDump.exe (23.80 KB)
- EPNetReplaceUpdater.exe (34.94 KB)
- EPNetUpdater.exe (142.30 KB)
- SBASignatureUpdater.exe (24.30 KB)
- CPEPNotifier.exe (48.74 KB)
- cptrayLogic.exe (23.94 KB)
- cptrayUI.exe (664.44 KB)
- logProcessor.exe (125.94 KB)
- HotspotApplication.exe (16.94 KB)
- wkhtmltopdf.exe (8.17 MB)
- cptrayWUI.exe (979.44 KB)
- UINotify.exe (23.94 KB)
- EPWD.exe (534.94 KB)
- EPWD_Tool.exe (69.94 KB)
...click to view all...The information on this page is only about version
87.31.1016 of Check Point Endpoint Security. Click on the links below for other Check Point Endpoint Security versions:
...click to view all...
Check Point Endpoint Security has the habit of leaving behind some leftovers.
Directories left on disk:- C:\Program Files (x86)\CheckPoint\Endpoint Security
Check for and delete the following files from your disk when you uninstall Check Point Endpoint Security:- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\BladeEssentialsActors.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\CertUtil.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\cpopenssl.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\DafDaAdaptor.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\DataStruct_.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epab.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epab_svc.exe
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabBotChecker.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCloudReporter.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCmi.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabCmiUpdater.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabDafAdaptor.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabMalwareLib.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabPMLibWrapper.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabRemediation.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabUIAdaptor.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabURLInterceptor.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabURLInterceptorStub.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabUtils.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\epabWS.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\AntiBot\ZdxAdaptor.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\BackupDriver\cpbak.cat
- C:\Program Files (x86)\CheckPoint\Endpoint Security\BackupDriver\cpbak.inf
- C:\Program Files (x86)\CheckPoint\Endpoint Security\BackupDriver\cpbak.sys
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\7799
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\AntiRansomware.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\ARCleaner.exe
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\AssemblyResolver.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\BackupAndRestoration.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\CP_AmsiProvider32.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\CP_AmsiProvider64.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpbaklib.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpdevmon64.sys
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpdhnypt.inf
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpdhnypt.sys
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpdiskflt.inf
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpdiskflt.sys
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpefrcli.exe
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpepmon.cat
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpepmon.inf
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cpepmon.sys
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphnet4x.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphnetldr32.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphnetldr64.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphnt32.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphnt64.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\CPHook.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphusr32.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\cphusr64.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\damagesConfig.xml
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\DataCollection.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\DataTubeGlobalPolicy.xml
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\DCPolicy.xml
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\DCPolicy_ZA.xml
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\devmonapi.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\Dia2Lib.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRGenConf
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRGenSmartExclusionGlobalConf
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_AR.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_DISKVOLUME.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_ENV.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_FLT.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_INJECT.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_IOCTL.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_NET.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_PS.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_REG.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_REGDETECT.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRSAL_SCRIPTS.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\EFRService.exe
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\FltSalConfig.xml
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\HarmonyAddin.dll
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\HarmonyAddin.vsto
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\Camouflage.out.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\Camouflage.xml.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\HashCopy.out.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\HashCopy.xml.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\MLConfig.xml.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\mldata.zip
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000000.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000000_info.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000001.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000001_info.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000002.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000002_info.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000003.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000003_info.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000004.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000004_info.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000005.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000005_info.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000006.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000006_info.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000007.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000007_info.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000008.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000008_info.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000009.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000009_info.json.tmp
- C:\Program Files (x86)\CheckPoint\Endpoint Security\EFR\indicators\UID1000010.json.tmp
Frequently the following registry data will not be uninstalled:- HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D672475CF8A566644BF1AC103789AF27
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{C574276D-5A8F-4666-B41F-CA017398FA72}
Registry values that are not removed from your PC:- HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Connect\TrGUI.exe.ApplicationCompany
- HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Connect\TrGUI.exe.FriendlyAppName
- HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files (x86)\CheckPoint\Endpoint Security\UIFramework\Bin\WUI\cptrayWUI.exe.ApplicationCompany
- HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files (x86)\CheckPoint\Endpoint Security\UIFramework\Bin\WUI\cptrayWUI.exe.FriendlyAppName
- HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D672475CF8A566644BF1AC103789AF27\ProductName
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files (x86)\CheckPoint\Endpoint Security\
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\WINDOWS\Installer\{C574276D-5A8F-4666-B41F-CA017398FA72}\
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Check Point Device Auxiliary Framework\ImagePath
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPDA\ImagePath
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\cpdevmon\ImagePath
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPEFR\ImagePath
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EpabService\ImagePath
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPClientUIService\ImagePath
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPWD\ImagePath
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ISWKL\ImagePath
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TESvc\ImagePath
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TracSrvWrapper\ImagePath
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\WscHelper\ImagePath
A way to erase Check Point Endpoint Security from your computer with the help of Advanced Uninstaller PRO
Check Point Endpoint Security is an application offered by the software company Check Point Software Technologies Ltd.. Some computer users choose to remove it. This is efortful because doing this manually takes some skill regarding removing Windows programs manually. One of the best SIMPLE approach to remove Check Point Endpoint Security is to use Advanced Uninstaller PRO. Here is how to do this:
1. If you don't have Advanced Uninstaller PRO on your PC, add it. This is a good step because Advanced Uninstaller PRO is one of the best uninstaller and all around utility to optimize your computer.
DOWNLOAD NOW- go to Download Link
- download the program by clicking on the green DOWNLOAD button
- set up Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. Take your time to get familiar with the program's interface and wealth of tools available. Advanced Uninstaller PRO is a very good Windows tool.
3. Press the General Tools button
4. Press the Uninstall Programs feature
5. All the applications installed on the PC will be made available to you
6. Scroll the list of applications until you find Check Point Endpoint Security or simply click the Search feature and type in "Check Point Endpoint Security". If it is installed on your PC the Check Point Endpoint Security app will be found very quickly. Notice that when you click Check Point Endpoint Security in the list of apps, some information about the application is made available to you:
- Safety rating (in the lower left corner). The star rating tells you the opinion other users have about Check Point Endpoint Security, from "Highly recommended" to "Very dangerous".
- Reviews by other users - Press the Read reviews button.
- Details about the program you want to remove, by clicking on the Properties button.
For instance you can see that for Check Point Endpoint Security:
- The publisher is: http://www.checkpoint.com
- The uninstall string is: MsiExec.exe /X{C574276D-5A8F-4666-B41F-CA017398FA72}
7. Click the Uninstall button. A window asking you to confirm will come up. Confirm the uninstall by pressing Uninstall. Advanced Uninstaller PRO will remove Check Point Endpoint Security.
8. After removing Check Point Endpoint Security, Advanced Uninstaller PRO will ask you to run a cleanup. Press Next to go ahead with the cleanup. All the items of Check Point Endpoint Security which have been left behind will be found and you will be able to delete them. By removing Check Point Endpoint Security with Advanced Uninstaller PRO, you are assured that no Windows registry entries, files or directories are left behind on your system.
Your Windows PC will remain clean, speedy and ready to take on new tasks.
Disclaimer
The text above is not a piece of advice to remove Check Point Endpoint Security by Check Point Software Technologies Ltd. from your computer, we are not saying that Check Point Endpoint Security by Check Point Software Technologies Ltd. is not a good application for your PC. This text simply contains detailed instructions on how to remove Check Point Endpoint Security in case you want to. The information above contains registry and disk entries that our application Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' computers.
Last update on: 2024-10-30 15:28:36.320