Uninstalling the Endpoint Security Client Using Challenge-Response

You can allow a user to uninstall the Endpoint Security client on their remote Windows computer without giving the client uninstall password to the user. A challenge-response procedure validates the identity of the user on the remote computer.

The administrator configures the Client Setting policy one-time only, for all users:

  1. In SmartEndpointClosed A Check Point GUI application which connects to the Endpoint Security Management Server, to manage your Endpoint Security environment - to deploy, monitor and configure Endpoint Security clients and policies. click the Policy tab.

  2. In the Client Settings policy ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session., in the Actions column, double-click Default installation and upgrade settings.

  3. Select Uninstall client using challenge-response to allow users to uninstall their Endpoint Security clients using a challenge-response procedure.

  4. Set the number of digits of the Response length. The default setting is 30 digits (High Security).

  1. The user starts the process to uninstall the Endpoint Security client:

    1. On the Windows computer, go to the Add or remove programs system setting, select the Endpoint Security, and click Uninstall.

      A Check Point Endpoint Security challenge-response window opens. The window has a Challenge field that contains a number with many digits, and a Response field that is blank.

    2. Give the Challenge number to the administrator. This can be by phone, text message, email, or in some other way.

  2. The administrator generates a Response and gives it to the user:

    1. In the SmartEndpoint main Menu, select Tools > Remote Help > Client Uninstall Remote Help.

      The Client Uninstall Remote Help window opens.

    2. In User Logon Name, select the name of the user who wants to uninstall the Endpoint Security client.

    3. In User Device, select the computer of the user.

    4. In Challenge from user, type the challenge number that the user gave you.

    5. Click Generate Response.

    6. Give the Response number to the user. This can be by phone, text message, email, or in some other way.

  3. The user uninstalls the Endpoint Security client:

    1. Type the Response number into the Check Point Endpoint Security challenge-response window.

    2. Uninstall the Endpoint Security client.