Publishers

Trellix Endpoint Security Firewall Trellix Endpoint Security Firewall





A guide to uninstall Trellix Endpoint Security Firewall from your system

Trellix Endpoint Security Firewall is a Windows application. Read more about how to uninstall it from your computer. The Windows release was developed by Trellix. Additional info about Trellix can be seen here. More information about Trellix Endpoint Security Firewall can be seen at . Usually the Trellix Endpoint Security Firewall application is placed in the C:\Program Files\McAfee\Endpoint Security folder, depending on the user's option during install. The complete uninstall command line for Trellix Endpoint Security Firewall is MsiExec.exe /X{6F88C6E9-CAD0-4D03-99E1-161383F9AD6F}. The application's main executable file has a size of 433.09 KB (443480 bytes) on disk and is named FwWindowsFirewallHandler.exe.

The executables below are part of Trellix Endpoint Security Firewall. They take about 14.11 MB (14793760 bytes) on disk.

  • atpconfigtool.exe (500.27 KB)
  • ATPErrMgr.exe (282.27 KB)
  • mfeatp.exe (439.77 KB)
  • setupATP.exe (857.56 KB)
  • ESConfigTool.exe (159.27 KB)
  • mfeesp.exe (353.77 KB)
  • mfeProvisionModeUtility.exe (221.27 KB)
  • PwdUninstall.exe (3.08 MB)
  • CCUninst.exe (42.77 KB)
  • MfeUpgradeTool.exe (155.27 KB)
  • FWInstCheck.exe (104.77 KB)
  • FwWindowsFirewallHandler.exe (433.09 KB)
  • mfefw.exe (212.09 KB)
  • setupFW.exe (844.77 KB)
  • amcfg.exe (336.59 KB)
  • mfeensppl.exe (683.21 KB)
  • mfetp.exe (293.09 KB)
  • mcshield.exe (478.55 KB)
  • mfeamcin.exe (3.94 MB)
  • setupTP.exe (856.77 KB)
...click to view all...

The current web page applies to Trellix Endpoint Security Firewall version 10.7.0 only. You can find here a few links to other Trellix Endpoint Security Firewall releases:


When planning to uninstall Trellix Endpoint Security Firewall you should check if the following data is left behind on your PC.

Folders found on disk after you uninstall Trellix Endpoint Security Firewall from your PC:
  • C:\Program Files\McAfee\Endpoint Security

The files below remain on your disk by Trellix Endpoint Security Firewall's application uninstaller when you removed it:
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AacEventManager.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AmcEventManager.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AMCoreUtil.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-datetime-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-debug-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-errorhandling-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l2-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-handle-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-heap-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-interlocked-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-libraryloader-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-localization-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-memory-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-namedpipe-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processenvironment-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-1.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-profile-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-rtlsupport-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-string-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-sysinfo-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-timezone-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-util-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-conio-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-convert-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-environment-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-filesystem-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-heap-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-locale-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-math-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-multibyte-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-private-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-process-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-runtime-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-stdio-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-string-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-time-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-utility-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ARR.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xsd
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_hss_msgbus.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_ma.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP_SelfProtection.rul
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPAmsiGuard.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atpconfigtool.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPDefXlateMap.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPDetectAmsiInitFail.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPErrMgr.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\blframework.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\com.mcafee_Adaptive_Threat_Protection.swidtag
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\concrt140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ctp.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DataUtils.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DeepRem.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\dscache.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0404\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0407\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0409\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040C\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0410\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0411\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0412\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0413\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0415\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0416\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0419\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\041D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0804\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0C0A\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Loglib.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ma_msgbus_auth.sig
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Matching.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\McVariantExport.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp_profile.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem32.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem64.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\msvcp140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RemediationBO.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\1033.mst
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\McAfee_Adaptive_Threat_Protection_x64.msi
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\setupATP.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RPModules.dat
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\rules.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ScanOrchestrator.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\script.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ucrtbase.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vccorlib140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140_1.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\x86\ATPAmsiGuard.dll

Frequently the following registry data will not be uninstalled:
  • HKEY_CLASSES_ROOT\Installer\Assemblies\C:|Program Files|McAfee|Endpoint Security|Adaptive Threat Protection|ATPDetectAmsiInitFail.dll
  • HKEY_CLASSES_ROOT\Installer\Assemblies\C:|Program Files|McAfee|Endpoint Security|Adaptive Threat Protection|x86|ATPDetectAmsiInitFail.dll
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\9E6C88F60DAC30D4991E6131389FDAF6
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{6F88C6E9-CAD0-4D03-99E1-161383F9AD6F}

Use regedit.exe to delete the following additional registry values from the Windows Registry:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\9E6C88F60DAC30D4991E6131389FDAF6\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\lang\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.UniversalCRT\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.VC140.CRT\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\RepairCache\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Firewall\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Threat Prevention\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Windows\Installer\{6F88C6E9-CAD0-4D03-99E1-161383F9AD6F}\


A way to uninstall Trellix Endpoint Security Firewall with the help of Advanced Uninstaller PRO

Trellix Endpoint Security Firewall is an application marketed by Trellix. Sometimes, people want to erase this application. This can be easier said than done because removing this manually requires some know-how regarding Windows program uninstallation. One of the best SIMPLE action to erase Trellix Endpoint Security Firewall is to use Advanced Uninstaller PRO. Take the following steps on how to do this:





1. If you don't have Advanced Uninstaller PRO already installed on your Windows system, install it. This is a good step because Advanced Uninstaller PRO is an efficient uninstaller and general utility to clean your Windows system.

DOWNLOAD NOW

  • navigate to Download Link
  • download the setup by clicking on the DOWNLOAD button
  • set up Advanced Uninstaller PRO
2. Run Advanced Uninstaller PRO. Take some time to admire Advanced Uninstaller PRO's design and number of features available. Advanced Uninstaller PRO is a very useful PC management program.

3. Click on the General Tools category
Go to General Tools


4. Activate the Uninstall Programs tool
Go to Uninstall Programs


5. A list of the applications installed on your PC will appear

6. Scroll the list of applications until you locate Trellix Endpoint Security Firewall or simply activate the Search field and type in "Trellix Endpoint Security Firewall". The Trellix Endpoint Security Firewall app will be found very quickly. Notice that when you click Trellix Endpoint Security Firewall in the list of programs, some information regarding the application is shown to you:


  • Star rating (in the lower left corner). This explains the opinion other users have regarding Trellix Endpoint Security Firewall, ranging from "Highly recommended" to "Very dangerous".
  • Reviews by other users - Click on the Read reviews button.
  • Technical information regarding the application you wish to remove, by clicking on the Properties button.
For instance you can see that for Trellix Endpoint Security Firewall:





  • The web site of the application is: https://kcm.trellix.com/corporate/index?page=content&id=KB82761
  • The uninstall string is: MsiExec.exe /X{6F88C6E9-CAD0-4D03-99E1-161383F9AD6F}
7. Press the Uninstall button. A confirmation page will show up. Confirm the uninstall by pressing Uninstall. Advanced Uninstaller PRO will uninstall Trellix Endpoint Security Firewall.
Uninstall Trellix Endpoint Security Firewall


8. After uninstalling Trellix Endpoint Security Firewall, Advanced Uninstaller PRO will ask you to run a cleanup. Press Next to proceed with the cleanup. All the items that belong Trellix Endpoint Security Firewall which have been left behind will be found and you will be asked if you want to delete them. By removing Trellix Endpoint Security Firewall using Advanced Uninstaller PRO, you can be sure that no registry items, files or directories are left behind on your disk.

Your computer will remain clean, speedy and ready to take on new tasks.



Disclaimer

The text above is not a piece of advice to remove Trellix Endpoint Security Firewall by Trellix from your PC, we are not saying that Trellix Endpoint Security Firewall by Trellix is not a good application. This page only contains detailed instructions on how to remove Trellix Endpoint Security Firewall supposing you decide this is what you want to do. The information above contains registry and disk entries that our application Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' PCs.

2023-05-27 / Written by Andreea Kartman for Advanced Uninstaller PRO

follow @DeeaKartman
Last update on: 2023-05-26 21:20:44.793