Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

How To Uninstall Dell Threat Defense

Summary: Dell Threat Defense can be uninstalled by following these instructions for either Windows or Mac.

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Symptoms

Note:

Dell Threat Defense may require uninstallation from an endpoint to:

  • Fix licensing discrepancies.
  • Troubleshoot the product.
  • Address operating system incompatibilities.

Affected Products:

Dell Threat Defense

Affected Versions:

v1.0 and Later

Affected Operating Systems:

Windows
Mac


Cause

Not applicable.

Resolution

The uninstallation process differs between Windows and Mac. Click the appropriate operating system for the steps to uninstall Dell Threat Defense.

Dell Threat Defense can be uninstalled on Windows through the:

  • User interface (UI)
  • Command-line interface (CLI)

Click the preferred method for more information.

UI

To uninstall the product:

  1. Select Programs and Features from the Control Panel menu.

Programs and Features

  1. Select Dell Threat Defense and then click Uninstall.

Dell Threat Defense Uninstall

  1. In the Dell Threat Defense Setup menu, select Uninstall.

Uninstall

Note: If a failure is encountered during uninstall, reference How to Collect Logs for Dell Threat Defense.
  1. On successful uninstallation, click Close.

Close

CLI

To uninstall the product:

Dell Threat Defense allows flexibility in command-line uninstallation options through the usage of switches, options, and parameters.

  1. Open the Command Prompt as an Administrator.
  2. Use the following commands depending on the installation package used to install the agent.
Install Agent Standard Install Windows Installer
DellThreatDefense_x64.msi msiexec /uninstall DellThreatDefense_x64.msi msiexec /x DellThreatDefense_x64.msi
DellThreatDefense_x86.msi msiexec /uninstall DellThreatDefense_x86.msi msiexec /x DellThreatDefense_x86.msi
DellThreatDefenseSetup.exe DellThreatDefenseSetup.exe /uninstall
 
Note: Command-line switches and parameters are case-sensitive.
 
Switch Meaning
/V Pass variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Silent Mode
/X Uninstall Mode
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.

 

Note: For a full list of options available with /V, reference Microsoft Command-Line Options SLN302162_en_US__8iC_External_Link_BD_v1 article.
 
Option Meaning
/qb User interface with Cancel button. Prompts for device reboot on installation completion.
/qb- Installation UI with Cancel button. Reboots device automatically on installation completion.
/qb! User interface without Cancel button. Prompts for device reboot on installation completion.
/qb!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/qn No user interface.

 

Property Values Description
UNINSTALLKEY <password> Auto input password

CLI Installation Examples:

Example #1

msiexec /x DellThreatDefense_x64.msi /qn UNINSTALLKEY=<PASSWORD> /Lxv* C:\temp\install.log

Example #1 contains:

  • Installer = DellThreatDefense_x64.msi
  • Silent install = Yes
  • Hidden install = Yes
  • Password Protected = Yes
  • Log verbosely = Yes
  • Installation log directory = C:\temp\install.log

Example #2

msiexec /uninstall DellThreatDefense_x86.msi  /quiet /Lxv* C:\temp\install.log

Example #2 contains:

  • Installer = DellThreatDefense_x86.msi
  • Silent install = Yes
  • Hidden install = No
  • Password Protected = No
  • Log verbosely = Yes
  • Installation log directory = C:\temp\install.log

The uninstallation of Dell Threat Defense varies based on version. Click the appropriate version for specific steps. For versioning information, reference How to Identify the Dell Threat Defense Version.

To uninstall the product:

  1. Search using Spotlight for Uninstall Dell Threat Defense.

Spotlight search

  1. Double-click Uninstall DellThreatDefense.
  2. A prompt requesting a password for uninstall may appear. Enter the password provided by the Dell Threat Defense administrator, press OK, and then go to Step 5. For more information about enabling or disabling the uninstall password, reference the Settings section of How To Manage Dell Threat Defense. If a password prompt did not occur, go to Step 4.
  3. Click Yes to confirm uninstall of DellThreatDefense.

Uninstall prompt

  1. Populate the Username and Password of a local administrator and then press OK to initiate an uninstallation. This administrator restriction is designed to prevent power users and guests from removing the application.

Admin credential prompt

  1. Uninstall is complete. No restart is required.
Note: If a failure is encountered during uninstall, reference How to Collect Logs for Dell Threat Defense.

To uninstall the product:

  1. Search using Spotlight for Uninstall CylancePROTECT.

Spotlight search

  1. Double-click Uninstall CylancePROTECT.
  2. A CylancePROTECT UI prompt requesting a password for uninstall may appear. Enter the password provided by the Dell Threat Defense administrator, press OK, and then go to Step 5. For more information about enabling or disabling the uninstall password, reference the Settings section of How To Manage Dell Threat Defense. If a password prompt did not occur, go to Step 4.

Uninstall password

  1. Click Yes to confirm uninstall of CylancePROTECT.

Uninstall prompt

  1. Populate the Username and Password of a local administrator and then press OK to initiate an uninstallation. This administrator restriction is designed to prevent power users and guests from removing CylancePROTECT.

Admin credential prompt

  1. Uninstall is complete. No restart is required.
Note: If a failure is encountered during uninstall, reference How to Collect Logs for Dell Threat Defense.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Additional Information

 

Videos

 

Article Properties


Affected Product

Dell Encryption, Dell Threat Defense

Last Published Date

19 Dec 2022

Version

14

Article Type

Solution