Uninstall Gfi Endpoint Security Agent Service
The DLP agent is intentionally designed to be difficult to remove. This is for security purposes. Below are the different methods used to uninstall the DLP agent. Note that administrative privileges will be required.
Windows Agent Uninstall
Method 1: Use Uninstall_agent batch file
Symantec provides a uninstall_agent.bat / uninstall_agent64.bat with the agent install files.
Follow these steps to use this batch file:
Deleting Computer(s) Deleting computer(s) - with uninstallation GFI EndPointSecurity will deploy protection policy updates and uninstalls Agent.: Deleting computer(s) - without uninstallation GFI EndPointSecurity will deploy protection policy updates and removes the relevant computer entry from the Computers list. However it leaves the agent installed on the target computer.
- Obtain the batch file from the agent install files that were used when installing the agent. See TECH249541 for details.
- If the agent was installed with an uninstall password then add that information to the batch file
- Copy the batch file to the client computer
- Run the batch file with administrator privileges.
Method 2: Msiexec command line uninstall
This method requires the uninstall password, unless there is not one configured or it has been disabled (see below). There are two options for uninstall via msiexec. The first one is to uninstall using the GUID. The second one is to provide the original .msi file.
GUID Uninstall
Login as an administrator user.
Start a command prompt (Administrator command prompt if Windows Vista or higher).
Run the command: msiexec /x {PRODUCT_ID.EN_US}
Example 14.6 mp2 silent uninstall command line:
NOTE: Substitute the appropriate value from the following table for {PRODUCT_ID.EN_US} in the command line above (include the curly braces).
Version | Product ID |
8.1 | {69E7464F-6E7E-4607-9C9E-085DA243D807} |
9.0 (9.0.1) | {0C9B68A6-63B4-473F-B281-24774FBBFF73} |
9.0.2 | {1BE4CCA3-9B6C-4943-B03E-19CBFA51A88F} |
9.0.3 | {D26F44C8-44BB-47FA-81E8-8F5EDA53E3AA} |
10 | {BB81F635-3CDB-405A-9AF3-0428D42EA605} |
10.5.x (10.5.0, 10.5.1, 10.5.2, 10.5.3) | {ADBACBC0-05F4-4610-BBB7-007A543D5B47} |
11 | {BC705572-C8CD-49e4-9693-BDC8E4D35570} |
11.1.x (11.1.0, 11.1.1, 11.1.2) | {2AF3B399-42A5-42bd-A5E0-72B657110363} |
11.5.x (11.5.0, 11.5.1) | {2AF3B399-42A5-42bd-A5E0-72B657110363} |
11.6 | {8790B246-A2CF-43b1-BDB0-2B4383BB9785} |
11.6.1 | {9E983F62-FFE9-4A92-AA24-2CA97B353A73} |
11.6.2 | {E818C222-AC57-46B4-9689-83DFB591D8F4} |
11.6.3 | {70365353-32F7-4367-8E71-ABDC966D0488} |
12 | {D39272A1-C04C-4295-8558-79E1991BA4FC} |
12.0.1 | {1C4B1778-B5E7-4A2F-98D2-F8FBDE968B6C} |
12.5 | {B29DE059-FEC4-4304-96BB-50308729BEDE} |
12.5.1 | {9967A8CA-E48C-4AE9-99C8-6A48AF57669A} |
12.5.2 | {D37485C2-CC03-4EEB-9BFA-E1409AE00A6C} |
12.5.3 | {96CF9953-B3BF-44AF-A173-4615878CD7BE} |
14.0.0 | {D38C2A80-D5BB-5654-DA40-748217D55C12} |
14.0.1 | {8CFAB030-FA5E-43B5-AC38-4992D050866E} |
14.0.2 | {C4D24B06-0D75-4853-B716-A8AD33C7B919} |
14.5 | {3B85F620-7485-4F58-8984-1E2C386C4BAC} |
14.5 MP1 | {FA2F2911-4C34-46B3-A020-98DE32CA705E} |
14.6 | {09338028-1DB6-4C5E-A5FC-D4F0142BF212} |
14.6 MP1 | {D675A448-C21A-47C9-9F9D-1FF04A02570A} |
14.6 MP2 | {BF9489ED-B077-4EA3-9A72-3AE1DC96E6CD} |
15.0 | {679AB287-7757-4321-A90A-55B6AE200476} |
15.0 MP1 | {EA83ED79-E1E7-4C7E-8B92-8DD2B2634FC9} |
15.1 | {554BE59C-56FA-485D-B8C9-7EAC54CB43DD} |
15.1 MP1 | {099385D0-F0AD-45C9-A0A1-F18CD845F21C} |
15.1 MP2 | {3CD80E90-4C66-4DC9-BF1F-AE37C62FA064} |
15.5 | {12F26F08-FE80-44EF-91BB-06CD0F5E1B16} |
15.5 MP1 | {11012518-A235-4178-8041-ACA48E052C60} |
15.5 MP2 |
You can identify which version of the Endpoint Agent is installed by looking at the file version properties of the edpa.exe or by navigating to the registry key:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstall
Search for the value called 'DisplayName' that contains the string 'AgentInstall'. The uninstall command (including the Product ID) will be under that key's UninstallString.
Itulah beberapa ulasan dan rekomendasi dari kami mengenai game keren ukuran kecil untuk PC terbaik yang paling banyak diminati. Game-game di atas bisa Anda mainkan pada PC maupun laptop yang hanya ber spesifikasi rendah, pc dan laptop spek kentang atau pas-pasan namun ingin memainkan game-game yang berkualitas. Tak hanya game-game di atas saja saja, beberapa game yang bisa dimainkan secara. Kumpulan Game PC ukuran Kecil Grafik Bagus – Ada banyak ya gamenya, pasti ada yang bingung donk dari kalian, apalagi bagi kalian yang mencari game pc ukuran kecil grafik bagus, nah untuk kalian yang mencari game ukuran kecil namun dengan grafis bagus, disini Mimin akan memberikan rekomendasi untuk kalian yang mau download game pc kecil grafis bagus. Download game bola ukuran kecil untuk pc.
MSI File Uninstall
The .msi file uninstall is useful if the local copy of the install has been removed from the system and when using the GUID method causes a 'This installation package could not be opened' error message.
Download latex for mac. LaTeX online services like Papeeria, Overleaf, ShareLaTeX, Datazar, and LaTeX base offer the ability to edit, view and download LaTeX files and resulting PDFs. CTAN You can obtain LaTeX from CTAN, which is the primary source of distribution for LaTeX.
To uninstall with the .msi copy down the AgentInstallX_X_X.msi file (Example: AgentInstall64_15_0.msi) that was used to install the agent on the machine. Note that it must be the same version .msi as the installed agent version. Then run the following command:
The above methods will prompt for an uninstall password if one is configured. If you are unsure what the uninstall password is then can either disable the uninstall password or setup a new uninstall password. These options are only available in DLP 15 and above.
To apply a new uninstall password from the console go to System > Agents > Agent Password.
Once on this page click configure then check the 'Apply New Uninstall Password' box. After that, type in the new uninstall password then re-enter the new password in the next field. Now click save. The updated uninstall password will go down to all agents with a good status. If the agent is disconnect and unable to connect it will keep the old uninstall password.

To disable the password go to System > Agents > Overview and select the agents that you want to disable the uninstall password on. Next click the Troubleshoot button and select 'Disable Uninstall Password'.
Method 3: Contact Support
Support has additional tools and resources to help remove agents that will not uninstall using the above method. Contact support for further assistance and reference this knowledge base article.
Mac Agent Uninstall
Using Uninstall Agent Tool
You can uninstall the Mac DLP Agent by running the uninstaller tool from the default agent installation location: /Library/Manufacturer/Endpoint Agent.
Follow these steps to use the uninstall agent tool:
- Copy the uninstall_agent tool from the agent install files. See TECH249541 for information on getting the agent install files.
- Open the Terminal app
- Run the following command:
Or you can review uninstall logs on the Terminal application by running this command:
Alternative solution: Disable Agent
As an alternative solution the agent can also be deactivated. This will stop the services and the agent machine can be used as though the agent was not installed and no policies will be enforced.
To disable the agent go to System > Agent > Overview. Click the box next to the target agent and the select the shutdown option.
This option can temporarily stop the agent (until the machine is restarted) or permanently shut down the agent by stopping the service and setting it to manual.
GFI EndPointSecurity enables you to allow or deny access to a specific device as well as to assign (where applicable) ‘full’ or ‘read only’ privileges over every supported device (e.g. CD/DVD drives, PDAs) on a user by user basis.
Aim[edit]
The aim of this book is to provide access to important information that can help users make the best use of GFI EndPointSecurity, Wikibookians are therefore encouraged to update this content and/or send feedback, ideas and comments on how this documentation can be further improved via the wiki discussion page, GFI Forums, or by sending an email to documentation@gfi.com.
All feedback is welcome! Please contribute your topics with the above principles in mind.
Introduction[edit]
The key advantage of removable media devices (or portable devices) is easy access. In theory, this may be of great advantage for organizations, but still, it is a well-reported fact that access and security are at opposite ends of the security continuum.Developments in removable media technology are escalating. Newer versions of portable devices, such as flash memory, have increased in:
- Better storage capacity
- Improved performance
- Easier and faster to install
- Physically small enough to carry in a pocket.
As a result, internal users may deliberately or accidentally:
- Take away sensitive data
- Expose confidential information
- Introduce malicious code (e.g. viruses, Trojans) that can bring the entire corporate network down
- Transfer inappropriate or offensive material on to corporate hardware
- Make personal copies of company data and intellectual property
- Get distracted during work hours.
In an attempt to control these threats, organizations have started to prohibit the use of (personally-owned) portable devices at work. Best practice dictates that you must never rely on voluntary compliance and the best way to ensure complete control over portable devices is by putting technological barriers.
GFI EndPointSecurity is the security solution that helps you maintain data integrity by preventing unauthorized access and transfer of content to and from the following devices or connection ports:
- USB Ports (e.g. Flash and Memory card readers, pen drives)
- Firewire ports (e.g. digital cameras, Firewire card readers)
- Wireless data connections (e.g. Bluetooth and Infrared dongles)
- Floppy disk drives (internal and external)
- Optical drives (e.g. CD, DVD)
- Magneto Optical drives (internal and external)
- Removable USB hard-disk drives
- Other drives such as Zip drives and tape drives (internal and external).
Through its technology, GFI EndPointSecurity enables you to allow or deny access and to assign ‘full’ or ‘read only’ privileges to:
- Devices (e.g. CD/DVD drives, PDAs).
- Local or Active Directory users/user groups.
With GFI EndPointSecurity you can also record the activity of all devices or connection ports being used on your target computers (including the date/time of usage and by whom the devices were used).
How it works[edit]
Deployment and monitoring[edit]
Stage 1 - Configure computers The administrator specifies which protection policy is assigned to which computers, and the log-on credentials to be used by GFI EndPointSecurity to access the target computers and deploy the agents. |
Stage 2 - Customize protection policy The administrator can customize a protection policy before or after deploying it. Customization options include the creation of power users, addition of blacklisted/whitelisted devices and device access permissions. |
Stage 3 - Deploy protection policy The administrator deploys the protection policy. Upon the first deployment of a protection policy, a GFI EndPointSecurity agent is automatically installed on the remote network target computer. Upon the next deployments of the same protection policy, the agent will be updated and not re-installed. |
Stage 4 - Monitor device access When agents have been deployed, the administrator can monitor all device access attempts via the GFI EndPointSecurity management console, receive alerts and generate reports through the GFI EndPointSecurity ReportPack. |
Device access[edit]
Stage 1 - Device attached to computer The user attaches a device to a target computer protected by GFI EndPointSecurity. |
Stage 2 - Protection policy enforcement The GFI EndPointSecurity agent installed on the target computer detects the attached device and goes through the protection policy rules applicable to the computer/user. This operation determines whether the device is allowed or blocked from being accessed. |
Stage 3 - Device usage allowed/blocked The user either receives an error message indicating that device usage has been blocked, or else is allowed to access the device. |
Temporary access[edit]
Stage 1 - User requests temporary device access The user executes the GFI EndPointSecurity Temporary Access tool from the computer on which the device is to be accessed. The tool is used to generate a request code, which the user communicates with the administrator. The user also needs to inform the administrator on the device types or connection ports that need to be accessed, and for how long will devices/ports access be required. |
Stage 2 - Administrator grants temporary access The administrator uses the Temporary Access feature within the GFI EndPointSecurity management console to enter the request code, specify devices/ports and time restrictions. An unlock code is generated which the administrator then communicates with the user |
Stage 3 - User activates temporary device access Once the user receives the unlock code sent by the administrator, this code is entered in the GFI EndPointSecurity Temporary Access tool to activate the temporary access and to be able to use the required devices/ports. |
GFI EndPointSecurity documentation[edit]
Getting Started Guide[edit]
This user manual is a comprehensive guide aimed at assisting you in installing, and testing GFI EndPointSecurity. It describes how to use and configure GFI EndPointSecurity to achieve the best possible corporate security.The following links enables you to browse GFI EndPointSecurity Getting Started Guide.
Chapter 1: Introduces this manual.
Chapter 2: Provides basic information on GFI EndPointSecurity and how it works.
Chapter 3: Provides information on system requirements and how to install the GFI EndPointSecurity.
Chapter 4: Provides information on how to configure the installation of GFI EndPointSecurity using the Quick Start wizard.
Chapter 5: Provides information on how to test your GFI EndPointSecurity installation.
Chapter 6: Provides information on licensing and versioning.
Chapter 7: Provides all the necessary information on how to deal with any problems encountered while using GFI EndPointSecurity. Also provides extensive support information.
Chapter 8: Defines technical terms used within GFI EndPointSecurity.
Chapter 9: Provides a list of errors displayed during deployment of agents from the management console.
Administration and Configuration Manual for GFI EndPointSecurity[edit]
This user manual is a comprehensive guide aimed at assisting you in creating and deploying GFI EndPointSecurity protection policies. It describes how to use and configure GFI EndPointSecurity to achieve the best possible corporate security.The following links enables you to browse GFI EndPointSecurity Administration and Configuration manual.
Chapter 1: Introduces this manual.
Chapter 2: Provides basic information on GFI EndPointSecurity and how it works.
Chapter 3: Provides information on how to create new protection policies using the Create Protection Policy wizard.
Chapter 4: Provides information on how to deploy protection policies on to target computers.
Chapter 5: Provides information on how to monitor device and port usage activity on protected target computers.
Chapter 6: Provides information on how to monitor the status of agents deployed on protected target computers.
Chapter 7: Provides information on how to get further information about the GFI EndPointSecurity ReportPack.
Chapter 8: Provides information on how to locate and report all devices that are or have been connected to scanned target computers.
Chapter 9: Provides information on how to configure protection policy settings.
Chapter 10: Provides information on how to customize GFI EndPointSecurity settings.
Chapter 11: Provides information on how to uninstall GFI EndPointSecurity agents and GFI EndPointSecurity application.
Chapter 12: Provides information on licensing and versioning.
Chapter 13: Provides all the necessary information on how to deal with any problems encountered while using GFI EndPointSecurity. Also provides extensive support information.
Chapter 14: Defines technical terms used within GFI EndPointSecurity.
Chapter 15: Provides a list of errors displayed during deployment of agents from the management console.
Troubleshooting[edit]
This section explains how you should go about resolving issues that you might encounter while using GFI EndPointSecurity. The main sources of information available are:
- The manual - most issues can be solved by reading GFI EndPointSecurity manuals
- Download product manuals from www.gfi.com
- GFI Knowledge Base articles
- GFI maintains a Knowledge Base, which includes answers to the most common problems. If you have a problem, please consult the Knowledge Base first. The Knowledge Base always has the most up-to-date listing of technical support questions and patches. To access the Knowledge Base, visit http://kbase.gfi.com/.
- Web forum
- User to user technical support is available via the web forum. The forum can be found at http://forums.gfi.com/.
- Contacting GFI Technical Support
- Online: Fill out the support request form on: http://support.gfi.com/supportrequestform.asp. Follow the instructions on this page closely to submit your support request.
- Phone: To obtain the correct technical support phone number for your region please visit http://www.gfi.com/company/contact.htm.