Publishers

Trellix Endpoint Security Platform Trellix Endpoint Security Platform





A guide to uninstall Trellix Endpoint Security Platform from your PC

This info is about Trellix Endpoint Security Platform for Windows. Here you can find details on how to uninstall it from your PC. The Windows release was created by Trellix. Go over here for more details on Trellix. More information about the software Trellix Endpoint Security Platform can be found at . The program is frequently located in the C:\Program Files\McAfee\Endpoint Security directory. Keep in mind that this path can vary being determined by the user's preference. The full uninstall command line for Trellix Endpoint Security Platform is MsiExec.exe /X{B16DE18D-4D5D-45F8-92BD-8DC17225AFD8}. Trellix Endpoint Security Platform's primary file takes around 500.27 KB (512272 bytes) and its name is atpconfigtool.exe.

Trellix Endpoint Security Platform installs the following the executables on your PC, taking about 14.11 MB (14793760 bytes) on disk.

  • atpconfigtool.exe (500.27 KB)
  • ATPErrMgr.exe (282.27 KB)
  • mfeatp.exe (439.77 KB)
  • setupATP.exe (857.56 KB)
  • ESConfigTool.exe (159.27 KB)
  • mfeesp.exe (353.77 KB)
  • mfeProvisionModeUtility.exe (221.27 KB)
  • PwdUninstall.exe (3.08 MB)
  • CCUninst.exe (42.77 KB)
  • MfeUpgradeTool.exe (155.27 KB)
  • FWInstCheck.exe (104.77 KB)
  • FwWindowsFirewallHandler.exe (433.09 KB)
  • mfefw.exe (212.09 KB)
  • setupFW.exe (844.77 KB)
  • amcfg.exe (336.59 KB)
  • mfeensppl.exe (683.21 KB)
  • mfetp.exe (293.09 KB)
  • mcshield.exe (478.55 KB)
  • mfeamcin.exe (3.94 MB)
  • setupTP.exe (856.77 KB)
...click to view all...

The current web page applies to Trellix Endpoint Security Platform version 10.7.0 alone. For more Trellix Endpoint Security Platform versions please click below:


If you are manually uninstalling Trellix Endpoint Security Platform we advise you to check if the following data is left behind on your PC.

Folders that were left behind:
  • C:\Program Files\McAfee\Endpoint Security

The files below were left behind on your disk by Trellix Endpoint Security Platform when you uninstall it:
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AacEventManager.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AmcEventManager.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\AMCoreUtil.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-console-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-datetime-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-debug-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-errorhandling-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-file-l2-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-handle-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-heap-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-interlocked-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-libraryloader-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-localization-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-memory-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-namedpipe-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processenvironment-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-processthreads-l1-1-1.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-profile-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-rtlsupport-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-string-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-synch-l1-2-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-sysinfo-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-timezone-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-core-util-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-conio-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-convert-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-environment-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-filesystem-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-heap-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-locale-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-math-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-multibyte-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-private-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-process-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-runtime-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-stdio-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-string-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-time-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\api-ms-win-crt-utility-l1-1-0.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ARR.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP.xsd
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_hss_msgbus.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atp_ma.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATP_SelfProtection.rul
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPAmsiGuard.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\atpconfigtool.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPDefXlateMap.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPDetectAmsiInitFail.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ATPErrMgr.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\blframework.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\com.mcafee_Adaptive_Threat_Protection.swidtag
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\concrt140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ctp.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DataUtils.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\DeepRem.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\dscache.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0404\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0407\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0409\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040C\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\040D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0410\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0411\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0412\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0413\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0415\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0416\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0419\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\041D\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0804\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\lang\0C0A\strings.bin
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Loglib.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ma_msgbus_auth.sig
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\Matching.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\McVariantExport.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp_profile.xml
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem32.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfedeeprem64.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\msvcp140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RemediationBO.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\1033.mst
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\McAfee_Adaptive_Threat_Protection_x64.msi
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RepairCache\setupATP.exe
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\RPModules.dat
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\rules.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ScanOrchestrator.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\script.db
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\ucrtbase.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vccorlib140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\vcruntime140_1.dll
  • C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\x86\ATPAmsiGuard.dll

Registry that is not cleaned:
  • HKEY_CLASSES_ROOT\Installer\Assemblies\C:|Program Files|McAfee|Endpoint Security|Adaptive Threat Protection|ATPDetectAmsiInitFail.dll
  • HKEY_CLASSES_ROOT\Installer\Assemblies\C:|Program Files|McAfee|Endpoint Security|Adaptive Threat Protection|x86|ATPDetectAmsiInitFail.dll
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D81ED61BD5D48F5429DBD81C2752FA8D
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{B16DE18D-4D5D-45F8-92BD-8DC17225AFD8}

Open regedit.exe in order to delete the following values:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D81ED61BD5D48F5429DBD81C2752FA8D\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\lang\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.UniversalCRT\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\Microsoft.VC140.CRT\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\RepairCache\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Firewall\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\McAfee\Endpoint Security\Threat Prevention\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Windows\Installer\{B16DE18D-4D5D-45F8-92BD-8DC17225AFD8}\


How to remove Trellix Endpoint Security Platform with the help of Advanced Uninstaller PRO

Trellix Endpoint Security Platform is an application offered by Trellix. Frequently, users try to remove this program. This is easier said than done because uninstalling this manually takes some experience related to Windows program uninstallation. One of the best QUICK approach to remove Trellix Endpoint Security Platform is to use Advanced Uninstaller PRO. Here are some detailed instructions about how to do this:





1. If you don't have Advanced Uninstaller PRO on your Windows PC, add it. This is good because Advanced Uninstaller PRO is a very useful uninstaller and general utility to optimize your Windows system.

DOWNLOAD NOW

  • go to Download Link
  • download the setup by pressing the DOWNLOAD button
  • set up Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. It's recommended to take some time to admire the program's interface and number of features available. Advanced Uninstaller PRO is a very useful program.

3. Press the General Tools category
Go to General Tools


4. Activate the Uninstall Programs tool
Go to Uninstall Programs


5. All the applications installed on the computer will be made available to you

6. Scroll the list of applications until you locate Trellix Endpoint Security Platform or simply click the Search feature and type in "Trellix Endpoint Security Platform". If it exists on your system the Trellix Endpoint Security Platform program will be found automatically. After you click Trellix Endpoint Security Platform in the list of programs, the following data regarding the application is available to you:


  • Star rating (in the left lower corner). The star rating tells you the opinion other people have regarding Trellix Endpoint Security Platform, ranging from "Highly recommended" to "Very dangerous".
  • Reviews by other people - Press the Read reviews button.
  • Technical information regarding the program you are about to remove, by pressing the Properties button.
For example you can see that for Trellix Endpoint Security Platform:





  • The web site of the program is: https://kcm.trellix.com/corporate/index?page=content&id=KB82761
  • The uninstall string is: MsiExec.exe /X{B16DE18D-4D5D-45F8-92BD-8DC17225AFD8}
7. Click the Uninstall button. A window asking you to confirm will show up. accept the uninstall by pressing the Uninstall button. Advanced Uninstaller PRO will automatically uninstall Trellix Endpoint Security Platform.
Uninstall Trellix Endpoint Security Platform


8. After removing Trellix Endpoint Security Platform, Advanced Uninstaller PRO will offer to run an additional cleanup. Press Next to proceed with the cleanup. All the items of Trellix Endpoint Security Platform that have been left behind will be detected and you will be able to delete them. By removing Trellix Endpoint Security Platform with Advanced Uninstaller PRO, you can be sure that no Windows registry items, files or directories are left behind on your computer.

Your Windows system will remain clean, speedy and ready to take on new tasks.



Disclaimer

This page is not a recommendation to uninstall Trellix Endpoint Security Platform by Trellix from your computer, nor are we saying that Trellix Endpoint Security Platform by Trellix is not a good software application. This text simply contains detailed info on how to uninstall Trellix Endpoint Security Platform supposing you want to. The information above contains registry and disk entries that our application Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' PCs.

2023-05-27 / Written by Daniel Statescu for Advanced Uninstaller PRO

follow @DanielStatescu
Last update on: 2023-05-26 21:20:44.803