Administrator Guide
Option Meaning
/qb!- Progress dialog without Cancel button, restarts itself after process completion
/qn No user interface
Uninstall Threat Protection Clients
Command Line Uninstallation
• Once extracted from the Endpoint Security Suite Pro master installer, the Threat Protection client installer can be located at C:
\extracted\Threat Protection\ThreatProtection\WinXXR\DellThreatProtection.msi.
• Go to Add/Remove Programs in the Control Panel and uninstall the following components in this order.
• McAfee Endpoint Security Firewall
• McAfee Endpoint Security Threat Prevention
• McAfee Endpoint Security Web Control
• McAfee Agent
• Then:
• The following example uninstalls the Threat Protection client .
MSIEXEC.EXE /x "DellThreatProtection.msi"
Uninstall Encryption Client
• To reduce decryption time, run the Windows Disk Cleanup Wizard to remove temporary les and other unneeded data.
• Plan to decrypt overnight, if possible.
• Turn o sleep mode to prevent an unattended computer from going to sleep. Decryption cannot occur on a sleeping computer.
• Shut down all processes and applications to minimize decryption failures because of locked les.
• Once the uninstall is complete and decryption is in progress, disable all network connectivity. Otherwise, new policies may be acquired
that re-enable encryption.
• Follow your existing process for decrypting data, such as issuing a policy update.
• Windows Encryption clients update the Security Management Server/Security Management Server Virtual to change the status to
Unprotected at the beginning of a Encryption client uninstall process. However, in the event that the client cannot contact the Security
Management Server/Security Management Server Virtual, regardless of the reason, the status cannot be updated. In this case, you will
need to manually Remove Endpoint in the Remote Management Console. If your organization uses this workow for compliance
purposes, Dell recommends that you verify that Unprotected has been set as expected, either in the Remote Management Console or
Compliance Reporter.
Process
• The Key Server (and Security Management Server) must be congured prior to uninstallation if using the Encryption Removal Agent's
Download Keys from Server option. See Congure Key Server for Uninstallation of Encryption Client Activated Against Security
Management Server for instructions. No prior action is needed if the client to uninstall is activated against a Security Management
Server Virtual, as Security Management Server Virtual does not use the Key Server.
• You must use the Dell Administrative Utility (CMGAd) prior launching the Encryption Removal Agent if using the Encryption Removal
Agent's Import Keys from a le option. This utility is used to obtain the encryption key bundle. See Use the Administrative Download
Utility (CMGAd) for instructions. The utility can be located in the Dell installation media.
Dell Data Security Endpoint Security Suite Pro
Uninstall Using the Child Installers
23