Omitir para ir al contenido principal
  • Hacer pedidos rápida y fácilmente
  • Ver pedidos y realizar seguimiento al estado del envío
  • Cree y acceda a una lista de sus productos
  • Administre sus sitios, productos y contactos de nivel de producto de Dell EMC con Administración de la empresa.

How To Uninstall Dell Threat Defense

Resumen: Dell Threat Defense can be uninstalled by following these instructions for either Windows or Mac.

Es posible que este artículo se traduzca automáticamente. Si tiene comentarios sobre su calidad, háganoslo saber mediante el formulario en la parte inferior de esta página.

Contenido del artículo


Síntomas

Note:

Dell Threat Defense may require uninstallation from an endpoint to:

  • Fix licensing discrepancies.
  • Troubleshoot the product.
  • Address operating system incompatibilities.

Affected Products:

Dell Threat Defense

Affected Versions:

v1.0 and Later

Affected Operating Systems:

Windows
Mac


Causa

Not applicable.

Resolución

The uninstallation process differs between Windows and Mac. Click the appropriate operating system for the steps to uninstall Dell Threat Defense.

Dell Threat Defense can be uninstalled on Windows through the:

  • User interface (UI)
  • Command-line interface (CLI)

Click the preferred method for more information.

UI

To uninstall the product:

  1. Select Programs and Features from the Control Panel menu.

Programs and Features

  1. Select Dell Threat Defense and then click Uninstall.

Dell Threat Defense Uninstall

  1. In the Dell Threat Defense Setup menu, select Uninstall.

Uninstall

Note: If a failure is encountered during uninstall, reference How to Collect Logs for Dell Threat Defense.
  1. On successful uninstallation, click Close.

Close

CLI

To uninstall the product:

Dell Threat Defense allows flexibility in command-line uninstallation options through the usage of switches, options, and parameters.

  1. Open the Command Prompt as an Administrator.
  2. Use the following commands depending on the installation package used to install the agent.
Install Agent Standard Install Windows Installer
DellThreatDefense_x64.msi msiexec /uninstall DellThreatDefense_x64.msi msiexec /x DellThreatDefense_x64.msi
DellThreatDefense_x86.msi msiexec /uninstall DellThreatDefense_x86.msi msiexec /x DellThreatDefense_x86.msi
DellThreatDefenseSetup.exe DellThreatDefenseSetup.exe /uninstall
 
Note: Command-line switches and parameters are case-sensitive.
 
Switch Meaning
/V Pass variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Silent Mode
/X Uninstall Mode
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.

 

Note: For a full list of options available with /V, reference Microsoft Command-Line Options SLN302162_en_US__8iC_External_Link_BD_v1 article.
 
Option Meaning
/qb User interface with Cancel button. Prompts for device reboot on installation completion.
/qb- Installation UI with Cancel button. Reboots device automatically on installation completion.
/qb! User interface without Cancel button. Prompts for device reboot on installation completion.
/qb!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/qn No user interface.

 

Property Values Description
UNINSTALLKEY <password> Auto input password

CLI Installation Examples:

Example #1

msiexec /x DellThreatDefense_x64.msi /qn UNINSTALLKEY=<PASSWORD> /Lxv* C:\temp\install.log

Example #1 contains:

  • Installer = DellThreatDefense_x64.msi
  • Silent install = Yes
  • Hidden install = Yes
  • Password Protected = Yes
  • Log verbosely = Yes
  • Installation log directory = C:\temp\install.log

Example #2

msiexec /uninstall DellThreatDefense_x86.msi  /quiet /Lxv* C:\temp\install.log

Example #2 contains:

  • Installer = DellThreatDefense_x86.msi
  • Silent install = Yes
  • Hidden install = No
  • Password Protected = No
  • Log verbosely = Yes
  • Installation log directory = C:\temp\install.log

The uninstallation of Dell Threat Defense varies based on version. Click the appropriate version for specific steps. For versioning information, reference How to Identify the Dell Threat Defense Version.

To uninstall the product:

  1. Search using Spotlight for Uninstall Dell Threat Defense.

Spotlight search

  1. Double-click Uninstall DellThreatDefense.
  2. A prompt requesting a password for uninstall may appear. Enter the password provided by the Dell Threat Defense administrator, press OK, and then go to Step 5. For more information about enabling or disabling the uninstall password, reference the Settings section of How To Manage Dell Threat Defense. If a password prompt did not occur, go to Step 4.
  3. Click Yes to confirm uninstall of DellThreatDefense.

Uninstall prompt

  1. Populate the Username and Password of a local administrator and then press OK to initiate an uninstallation. This administrator restriction is designed to prevent power users and guests from removing the application.

Admin credential prompt

  1. Uninstall is complete. No restart is required.
Note: If a failure is encountered during uninstall, reference How to Collect Logs for Dell Threat Defense.

To uninstall the product:

  1. Search using Spotlight for Uninstall CylancePROTECT.

Spotlight search

  1. Double-click Uninstall CylancePROTECT.
  2. A CylancePROTECT UI prompt requesting a password for uninstall may appear. Enter the password provided by the Dell Threat Defense administrator, press OK, and then go to Step 5. For more information about enabling or disabling the uninstall password, reference the Settings section of How To Manage Dell Threat Defense. If a password prompt did not occur, go to Step 4.

Uninstall password

  1. Click Yes to confirm uninstall of CylancePROTECT.

Uninstall prompt

  1. Populate the Username and Password of a local administrator and then press OK to initiate an uninstallation. This administrator restriction is designed to prevent power users and guests from removing CylancePROTECT.

Admin credential prompt

  1. Uninstall is complete. No restart is required.
Note: If a failure is encountered during uninstall, reference How to Collect Logs for Dell Threat Defense.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Información adicional

 

Videos

 

Propiedades del artículo


Producto comprometido

Dell Encryption, Dell Threat Defense

Fecha de la última publicación

19 dic 2022

Versión

14

Tipo de artículo

Solution