跳至主要內容
  • 簡單快速地下訂單
  • 檢視訂單及追蹤商品運送狀態
  • 建立並存取您的產品清單
  • 使用「公司管理」來管理您的 Dell EMC 網站、產品和產品層級連絡人。

How To Uninstall Dell Threat Defense

摘要: Dell Threat Defense can be uninstalled by following these instructions for either Windows or Mac.

本文可能採用自動翻譯。如果您對翻譯品質有任何寶貴意見,請使用此頁面底部的表單告訴我們,謝謝。

文章內容


症狀

Note:

Dell Threat Defense may require uninstallation from an endpoint to:

  • Fix licensing discrepancies.
  • Troubleshoot the product.
  • Address operating system incompatibilities.

Affected Products:

Dell Threat Defense

Affected Versions:

v1.0 and Later

Affected Operating Systems:

Windows
Mac


原因

Not applicable.

解析度

The uninstallation process differs between Windows and Mac. Click the appropriate operating system for the steps to uninstall Dell Threat Defense.

Dell Threat Defense can be uninstalled on Windows through the:

  • User interface (UI)
  • Command-line interface (CLI)

Click the preferred method for more information.

UI

To uninstall the product:

  1. Select Programs and Features from the Control Panel menu.

Programs and Features

  1. Select Dell Threat Defense and then click Uninstall.

Dell Threat Defense Uninstall

  1. In the Dell Threat Defense Setup menu, select Uninstall.

Uninstall

Note: If a failure is encountered during uninstall, reference How to Collect Logs for Dell Threat Defense.
  1. On successful uninstallation, click Close.

Close

CLI

To uninstall the product:

Dell Threat Defense allows flexibility in command-line uninstallation options through the usage of switches, options, and parameters.

  1. Open the Command Prompt as an Administrator.
  2. Use the following commands depending on the installation package used to install the agent.
Install Agent Standard Install Windows Installer
DellThreatDefense_x64.msi msiexec /uninstall DellThreatDefense_x64.msi msiexec /x DellThreatDefense_x64.msi
DellThreatDefense_x86.msi msiexec /uninstall DellThreatDefense_x86.msi msiexec /x DellThreatDefense_x86.msi
DellThreatDefenseSetup.exe DellThreatDefenseSetup.exe /uninstall
 
Note: Command-line switches and parameters are case-sensitive.
 
Switch Meaning
/V Pass variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Silent Mode
/X Uninstall Mode
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.

 

Note: For a full list of options available with /V, reference Microsoft Command-Line Options SLN302162_en_US__8iC_External_Link_BD_v1 article.
 
Option Meaning
/qb User interface with Cancel button. Prompts for device reboot on installation completion.
/qb- Installation UI with Cancel button. Reboots device automatically on installation completion.
/qb! User interface without Cancel button. Prompts for device reboot on installation completion.
/qb!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/qn No user interface.

 

Property Values Description
UNINSTALLKEY <password> Auto input password

CLI Installation Examples:

Example #1

msiexec /x DellThreatDefense_x64.msi /qn UNINSTALLKEY=<PASSWORD> /Lxv* C:\temp\install.log

Example #1 contains:

  • Installer = DellThreatDefense_x64.msi
  • Silent install = Yes
  • Hidden install = Yes
  • Password Protected = Yes
  • Log verbosely = Yes
  • Installation log directory = C:\temp\install.log

Example #2

msiexec /uninstall DellThreatDefense_x86.msi  /quiet /Lxv* C:\temp\install.log

Example #2 contains:

  • Installer = DellThreatDefense_x86.msi
  • Silent install = Yes
  • Hidden install = No
  • Password Protected = No
  • Log verbosely = Yes
  • Installation log directory = C:\temp\install.log

The uninstallation of Dell Threat Defense varies based on version. Click the appropriate version for specific steps. For versioning information, reference How to Identify the Dell Threat Defense Version.

To uninstall the product:

  1. Search using Spotlight for Uninstall Dell Threat Defense.

Spotlight search

  1. Double-click Uninstall DellThreatDefense.
  2. A prompt requesting a password for uninstall may appear. Enter the password provided by the Dell Threat Defense administrator, press OK, and then go to Step 5. For more information about enabling or disabling the uninstall password, reference the Settings section of How To Manage Dell Threat Defense. If a password prompt did not occur, go to Step 4.
  3. Click Yes to confirm uninstall of DellThreatDefense.

Uninstall prompt

  1. Populate the Username and Password of a local administrator and then press OK to initiate an uninstallation. This administrator restriction is designed to prevent power users and guests from removing the application.

Admin credential prompt

  1. Uninstall is complete. No restart is required.
Note: If a failure is encountered during uninstall, reference How to Collect Logs for Dell Threat Defense.

To uninstall the product:

  1. Search using Spotlight for Uninstall CylancePROTECT.

Spotlight search

  1. Double-click Uninstall CylancePROTECT.
  2. A CylancePROTECT UI prompt requesting a password for uninstall may appear. Enter the password provided by the Dell Threat Defense administrator, press OK, and then go to Step 5. For more information about enabling or disabling the uninstall password, reference the Settings section of How To Manage Dell Threat Defense. If a password prompt did not occur, go to Step 4.

Uninstall password

  1. Click Yes to confirm uninstall of CylancePROTECT.

Uninstall prompt

  1. Populate the Username and Password of a local administrator and then press OK to initiate an uninstallation. This administrator restriction is designed to prevent power users and guests from removing CylancePROTECT.

Admin credential prompt

  1. Uninstall is complete. No restart is required.
Note: If a failure is encountered during uninstall, reference How to Collect Logs for Dell Threat Defense.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

其他資訊

 

影片

 

文章屬性


受影響的產品

Dell Encryption, Dell Threat Defense

上次發佈日期

19 12月 2022

版本

14

文章類型

Solution