Publishers

Plate-forme Trellix Endpoint Security Plate-forme Trellix Endpoint Security





A way to uninstall Plate-forme Trellix Endpoint Security from your PC

This page is about Plate-forme Trellix Endpoint Security for Windows. Here you can find details on how to remove it from your computer. It is written by Trellix. More data about Trellix can be seen here. Click on to get more data about Plate-forme Trellix Endpoint Security on Trellix's website. Plate-forme Trellix Endpoint Security is frequently set up in the C:\Program Files\McAfee\Endpoint Security directory, however this location can differ a lot depending on the user's decision while installing the application. The full uninstall command line for Plate-forme Trellix Endpoint Security is MsiExec.exe /X{B16DE18D-4D5D-45F8-92BD-8DC17225AFD8}. atpconfigtool.exe is the programs's main file and it takes circa 500.27 KB (512272 bytes) on disk.

The executables below are part of Plate-forme Trellix Endpoint Security. They occupy about 15.11 MB (15843224 bytes) on disk.

  • atpconfigtool.exe (500.27 KB)
  • ATPErrMgr.exe (282.27 KB)
  • mfeatp.exe (439.77 KB)
  • setupATP.exe (857.56 KB)
  • ESConfigTool.exe (159.27 KB)
  • mfeesp.exe (353.77 KB)
  • mfeProvisionModeUtility.exe (221.27 KB)
  • PwdUninstall.exe (3.08 MB)
  • CCUninst.exe (42.77 KB)
  • setupCC.exe (1.00 MB)
  • MfeUpgradeTool.exe (155.27 KB)
  • FWInstCheck.exe (104.77 KB)
  • FwWindowsFirewallHandler.exe (433.09 KB)
  • mfefw.exe (212.09 KB)
  • setupFW.exe (844.77 KB)
  • amcfg.exe (336.59 KB)
  • mfeensppl.exe (683.21 KB)
  • mfetp.exe (293.09 KB)
  • mcshield.exe (478.55 KB)
  • mfeamcin.exe (3.94 MB)
  • setupTP.exe (856.77 KB)
...click to view all...

The current page applies to Plate-forme Trellix Endpoint Security version 10.7.0 alone. You can find below info on other application versions of Plate-forme Trellix Endpoint Security:


Some files and registry entries are regularly left behind when you uninstall Plate-forme Trellix Endpoint Security.

Directories that were left behind:
  • C:\Program Files\McAfee\Endpoint Security

Files remaining:
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AacEventManager.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AmcEventManager.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AMCoreUtil.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-datetime-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-debug-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-errorhandling-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l2-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-handle-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-heap-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-interlocked-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-libraryloader-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-localization-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-memory-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-namedpipe-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processenvironment-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-1.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-profile-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-rtlsupport-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-string-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-sysinfo-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-timezone-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-util-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-conio-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-convert-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-environment-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-filesystem-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-heap-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-locale-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-math-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-multibyte-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-private-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-process-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-runtime-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-stdio-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-string-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-time-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-utility-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ARR.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xsd
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_hss_msgbus.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_ma.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP_SelfProtection.rul
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPAmsiGuard.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atpconfigtool.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPDefXlateMap.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPDetectAmsiInitFail.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPErrMgr.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\blframework.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\com.mcafee_Adaptive_Threat_Protection.swidtag
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\concrt140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ctp.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DataUtils.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DeepRem.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\dscache.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0404\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0407\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0409\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040C\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0410\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0411\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0412\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0413\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0415\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0416\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0419\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\041D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0804\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0C0A\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Loglib.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ma_msgbus_auth.sig
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Matching.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\McVariantExport.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp_profile.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem32.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem64.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\msvcp140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RemediationBO.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\1036.mst
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\McAfee_Adaptive_Threat_Protection_x64.msi
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\setupATP.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RPModules.dat
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\rules.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ScanOrchestrator.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ucrtbase.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vccorlib140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140_1.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\x86\ATPAmsiGuard.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\x86\ATPDetectAmsiInitFail.dll

Registry keys:
  • HKEY_CLASSES_ROOT\Installer\Assemblies\C:|Program Files|McAfee|Endpoint Security|Adaptive Threat Protection|ATPDetectAmsiInitFail.dll
  • HKEY_CLASSES_ROOT\Installer\Assemblies\C:|Program Files|McAfee|Endpoint Security|Adaptive Threat Protection|x86|ATPDetectAmsiInitFail.dll
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D81ED61BD5D48F5429DBD81C2752FA8D
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{B16DE18D-4D5D-45F8-92BD-8DC17225AFD8}

Open regedit.exe in order to delete the following registry values:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D81ED61BD5D48F5429DBD81C2752FA8D\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\lang\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.UniversalCRT\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.VC140.CRT\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\RepairCache\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Threat Prevention\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Windows\Installer\{B16DE18D-4D5D-45F8-92BD-8DC17225AFD8}\


A way to remove Plate-forme Trellix Endpoint Security from your PC with Advanced Uninstaller PRO

Plate-forme Trellix Endpoint Security is an application offered by Trellix. Sometimes, users choose to erase it. Sometimes this is easier said than done because performing this manually takes some advanced knowledge regarding removing Windows applications by hand. The best QUICK solution to erase Plate-forme Trellix Endpoint Security is to use Advanced Uninstaller PRO. Here is how to do this:





1. If you don't have Advanced Uninstaller PRO already installed on your system, add it. This is a good step because Advanced Uninstaller PRO is a very useful uninstaller and general tool to maximize the performance of your computer.

DOWNLOAD NOW

  • go to Download Link
  • download the program by pressing the DOWNLOAD button
  • set up Advanced Uninstaller PRO
2. Run Advanced Uninstaller PRO. It's recommended to take your time to get familiar with Advanced Uninstaller PRO's design and number of functions available. Advanced Uninstaller PRO is a powerful package of tools.

3. Click on the General Tools button
Go to General Tools


4. Click on the Uninstall Programs button
Go to Uninstall Programs


5. All the applications existing on the computer will be made available to you

6. Scroll the list of applications until you locate Plate-forme Trellix Endpoint Security or simply activate the Search field and type in "Plate-forme Trellix Endpoint Security". If it exists on your system the Plate-forme Trellix Endpoint Security application will be found very quickly. Notice that when you select Plate-forme Trellix Endpoint Security in the list of applications, some data regarding the program is made available to you:


  • Safety rating (in the lower left corner). This explains the opinion other people have regarding Plate-forme Trellix Endpoint Security, ranging from "Highly recommended" to "Very dangerous".
  • Opinions by other people - Click on the Read reviews button.
  • Technical information regarding the application you wish to uninstall, by pressing the Properties button.
For example you can see that for Plate-forme Trellix Endpoint Security:





  • The publisher is: https://trellix.com/
  • The uninstall string is: MsiExec.exe /X{B16DE18D-4D5D-45F8-92BD-8DC17225AFD8}
7. Click the Uninstall button. A confirmation dialog will appear. Confirm the removal by pressing Uninstall. Advanced Uninstaller PRO will then uninstall Plate-forme Trellix Endpoint Security.
Uninstall Plate-forme Trellix Endpoint Security


8. After uninstalling Plate-forme Trellix Endpoint Security, Advanced Uninstaller PRO will ask you to run an additional cleanup. Press Next to go ahead with the cleanup. All the items that belong Plate-forme Trellix Endpoint Security which have been left behind will be detected and you will be asked if you want to delete them. By removing Plate-forme Trellix Endpoint Security with Advanced Uninstaller PRO, you can be sure that no Windows registry entries, files or folders are left behind on your disk.

Your Windows computer will remain clean, speedy and able to run without errors or problems.



Disclaimer

The text above is not a recommendation to remove Plate-forme Trellix Endpoint Security by Trellix from your PC, nor are we saying that Plate-forme Trellix Endpoint Security by Trellix is not a good application for your PC. This page only contains detailed info on how to remove Plate-forme Trellix Endpoint Security supposing you decide this is what you want to do. Here you can find registry and disk entries that other software left behind and Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' PCs.

2023-10-11 / Written by Daniel Statescu for Advanced Uninstaller PRO

follow @DanielStatescu
Last update on: 2023-10-11 07:39:39.963