Administrator Guide

Option Meaning
/qb!- Progress dialog without Cancel button, restarts itself after process completion
/qn No user interface
Uninstall Threat Protection Clients
Command Line Uninstallation
Once extracted from the Endpoint Security Suite Pro master installer, the Threat Protection client installer can be located at C:
\extracted\Threat Protection\ThreatProtection\WinXXR\DellThreatProtection.msi.
Go to Add/Remove Programs in the Control Panel and uninstall the following components in this order.
McAfee Endpoint Security Firewall
McAfee Endpoint Security Threat Prevention
McAfee Endpoint Security Web Control
McAfee Agent
Then:
The following example uninstalls the Threat Protection client .
MSIEXEC.EXE /x "DellThreatProtection.msi"
Uninstall Encryption Client
To reduce decryption time, run the Windows Disk Cleanup Wizard to remove temporary les and other unneeded data.
Plan to decrypt overnight, if possible.
Turn o sleep mode to prevent an unattended computer from going to sleep. Decryption cannot occur on a sleeping computer.
Shut down all processes and applications to minimize decryption failures because of locked les.
Once the uninstall is complete and decryption is in progress, disable all network connectivity. Otherwise, new policies may be acquired
that re-enable encryption.
Follow your existing process for decrypting data, such as issuing a policy update.
Windows Encryption clients update the Security Management Server/Security Management Server Virtual to change the status to
Unprotected at the beginning of a Encryption client uninstall process. However, in the event that the client cannot contact the Security
Management Server/Security Management Server Virtual, regardless of the reason, the status cannot be updated. In this case, you will
need to manually Remove Endpoint in the Remote Management Console. If your organization uses this workow for compliance
purposes, Dell recommends that you verify that Unprotected has been set as expected, either in the Remote Management Console or
Compliance Reporter.
Process
The Key Server (and Security Management Server) must be congured prior to uninstallation if using the Encryption Removal Agent's
Download Keys from Server option. See Congure Key Server for Uninstallation of Encryption Client Activated Against Security
Management Server for instructions. No prior action is needed if the client to uninstall is activated against a Security Management
Server Virtual, as Security Management Server Virtual does not use the Key Server.
You must use the Dell Administrative Utility (CMGAd) prior launching the Encryption Removal Agent if using the Encryption Removal
Agent's Import Keys from a le option. This utility is used to obtain the encryption key bundle. See Use the Administrative Download
Utility (CMGAd) for instructions. The utility can be located in the Dell installation media.
Dell Data Security Endpoint Security Suite Pro
Uninstall Using the Child Installers
23