Technical Support

Need help?

 

1-844-956-2648
10/5 availability

Email us
Response time: 24 h

1-844-255-7356
Remote PC access
Premium Support

Centralized uninstallation of Endpoint Protection through the distribution tool

Information applies to:

Products
Adaptive Defense 360
Endpoint Protection
Endpoint Protection Plus

The Distribution tool lets you uninstall the protection centrally, avoiding manual intervention from users throughout the process.

Downloading the distribution tool

  1. Go to the PCOP or PCOP Advanced administration console.
  2. Select the Installation tab.
  3. Click Uninstallation in the panel on the left.
  4. Click Centralized uninstallation (distribution tool).

    Protection uninstallation - Centralized uninstallation (distribution tool)
  5. Click Download distribution tool link.

    Centralized uninstallation - download distribution tool
  6. Click Save in the Distributiontool.msi file download window.

    File Download Security Warning
  7. When the download has finished, run the Distributiontool.msi file from the directory you have saved it in. A wizard will guide you through the installation process of the distribution tool.

Uninstalling the protection

  1. Go to Start, Programs, Panda Security, Endpoint Protection Distribution tool or to the shortcut on your Desktop.
  2. Select Uninstall protection in the console. The Protection Uninstallation screen will open, which will allow you to uninstall the protection in two ways:
    • Uninstallation by Domain

      Uninstallation by domain
      1. Select the domains or computers in the network tree on which you want to uninstall it.
      2. Enter the uninstallation password which you used when installing. If you did not use a password, leave this field blank.
      3. Use the user name and password with administrator permissions to carry out the uninstallation. The user name must be entered in domain\user name format.
      4. Specify if you want to keep items in quarantine or not. If you select this checkbox, quarantined items will be deleted.
      5. Select if you want to restart computers after uninstallation. In this case, the computers will be restarted automatically after uninstallation is complete.
      6. Once the data is entered, click Uninstall to generate the uninstallation jobs.
    • Uninstallation by IP address or computer name

      Uninstallation by IP address
      1. Add the name or IP address of the computers to be uninstalled, separated by commas. You can also select IP ranges using the ‘-‘ symbol (e.g. 172.18.15.10 – 172.18.15.50)
      2. Enter the uninstallation password which you used when installing. If you did not use a password, leave this field blank.
      3. Use the user name and password with administrator permissions to carry out the uninstallation. The user name must be entered in domain\user name format.
      4. Specify if you want to keep items in quarantine or not. If you select this checkbox, quarantined items will be deleted.
      5. Select if you want to restart computers after uninstallation. In this case, the computers will be restarted automatically after uninstallation is complete.
      6. Click Uninstall to generate the installation jobs
  3. Check the uninstallation job has completed successfully from the console.
  4. The protection uninstallation will begin, completely transparently.
  5. Restart the computer if prompted.

Help nº- 20160502 50053 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





Do you need one of our technicians to connect to
your PC or device remotely to fix a problem?

Discover our Premium Services

ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT