Technical Support

Need help?

 

Centralized uninstallation of Endpoint Protection through the distribution tool

Information applies to:

Products
Adaptive Defense 360
Endpoint Protection
Endpoint Protection Plus

The Distribution tool lets you uninstall the protection centrally, avoiding manual intervention from users throughout the process.

Downloading the distribution tool

  1. Go to the PCOP or PCOP Advanced administration console.
  2. Select the Installation tab.
  3. Click Uninstallation in the panel on the left.
  4. Click Centralized uninstallation (distribution tool).

    Protection uninstallation - Centralized uninstallation (distribution tool)
  5. Click Download distribution tool link.

    Centralized uninstallation - download distribution tool
  6. Click Save in the Distributiontool.msi file download window.

    File Download Security Warning
  7. When the download has finished, run the Distributiontool.msi file from the directory you have saved it in. A wizard will guide you through the installation process of the distribution tool.

Uninstalling the protection

  1. Go to Start, Programs, Panda Security, Endpoint Protection Distribution tool or to the shortcut on your Desktop.
  2. Select Uninstall protection in the console. The Protection Uninstallation screen will open, which will allow you to uninstall the protection in two ways:
    • Uninstallation by Domain

      Uninstallation by domain
      1. Select the domains or computers in the network tree on which you want to uninstall it.
      2. Enter the uninstallation password which you used when installing. If you did not use a password, leave this field blank.
      3. Use the user name and password with administrator permissions to carry out the uninstallation. The user name must be entered in domain\user name format.
      4. Specify if you want to keep items in quarantine or not. If you select this checkbox, quarantined items will be deleted.
      5. Select if you want to restart computers after uninstallation. In this case, the computers will be restarted automatically after uninstallation is complete.
      6. Once the data is entered, click Uninstall to generate the uninstallation jobs.
    • Uninstallation by IP address or computer name

      Uninstallation by IP address
      1. Add the name or IP address of the computers to be uninstalled, separated by commas. You can also select IP ranges using the ‘-‘ symbol (e.g. 172.18.15.10 – 172.18.15.50)
      2. Enter the uninstallation password which you used when installing. If you did not use a password, leave this field blank.
      3. Use the user name and password with administrator permissions to carry out the uninstallation. The user name must be entered in domain\user name format.
      4. Specify if you want to keep items in quarantine or not. If you select this checkbox, quarantined items will be deleted.
      5. Select if you want to restart computers after uninstallation. In this case, the computers will be restarted automatically after uninstallation is complete.
      6. Click Uninstall to generate the installation jobs
  3. Check the uninstallation job has completed successfully from the console.
  4. The protection uninstallation will begin, completely transparently.
  5. Restart the computer if prompted.

Help nº- 20160502 50053 EN
ALWAYS ONLINE TO HELP YOU TWITTER FORUM
ALWAYS ONLINE TO HELP YOU TWITTER FORUM