How to manually uninstall Symantec Network Access Control client 12.1 from Windows Vista, Windows 7, and Windows 2008 32 and 64 bit Operating Systems

Article:HOWTO55826  |  Created: 2011-06-30  |  Updated: 2012-03-01  |  Article URL http://www.symantec.com/docs/HOWTO55826
Article Type
How To



This document describes how to remove Symantec Network Access Control (SNAC) client from Windows Vista, Windows 7, and Windows 2008 based operating systems, both x86 (32 bit) and x64 (64 bit), manually.

Warning: The manual removal steps outlined below can disable any other Symantec products that are installed on the computer. It is recommended that all Symantec products be uninstalled by using Add or Remove Programs before starting this process. Manual uninstall via file removal and registry manipulation should only be attempted as a last resort after first running traditional removal through Add or Remove Programs, and if that does not work, by using CleanWipe.

Not all files, folders, registry keys, or registry values may be present. If an entry does not exist, move on to the next one.

 

Log on as Administrator
Manual removal of Symantec Network Access Control must be done from the Administrator account. To enable the Administrator account, read the following document from the Microsoft Knowledge Base: Enable and Disable the Built-in Administrator Account.

When the Administrator account is enabled, log on to that account.

Back up the Windows registry

Before you begin this procedure, back up the Windows registry. To do so, read the Microsoft document Back up the registry.

 

To stop Symantec Network Access Control

  1. Click Start > Run.

  2. Type msconfig, and click OK.

  3. On the Startup tab, uncheck ccapp.

  4. On the Services tab, uncheck the following:

    • Symantec Event Manager

    • Symantec Settings Manager

    • Liveupdate

    • Symantec Management Client

    • Symantec Network Access Control

    • Symantec Endpoint Protection

  5. Click OK.

  6. Click Start > Run.

  7. Type regedit, and click OK.

  8. Navigate to the following key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SepMasterService

  9. Change the Start value to 4.

  10. Repeat steps 8 for the following keys:

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SmcService
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SNAC
  11. Restart the computer.

  12. After you restart the computer, a message appears. Check the box and click OK.


Remove the Teefer driver
  1. Click Start > Settings > Control Panel > Network Connections.

  2. Click a connection.

  3. In the dialog, click Properties.

  4. Select Teefer Driver and click Uninstall.

  5. Repeat these steps for each Network Connection.

  6. Restart the computer.



 
Remove Symantec Network Access Control from the registry
  1. Click Start > Run.
  2. Type regedit and Click OK.
  3. In the Windows registry editor, in the left pane, delete the following keys if they are present.

    • HKEY_CURRENT_USER\Software\Symantec\Symantec Endpoint Protection

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\BHDrvx86

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IDSVix86

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\NAVENG

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\NAVEX15

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SepMasterService

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SmcService

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SNAC

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SnacNp

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SRTSP

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SRTSPX

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SyDvCtrl

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SymDS

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SymEFA

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SymEvent

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SymIRON

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SYMNETS

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SysPlant

    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Teefer2

  4. In the Windows registry editor, in the left pane, delete the following keys if they are present:

    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Smc.exe
    • HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Symantec Endpoint Protection
    • HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432node\Microsoft\Windows\CurrentVersion\App Paths\Smc.exe
    • HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432node\Symantec\Symantec Endpoint Protection
  5. Go to HKEY_CLASSES_ROOT, and delete the following keys if they are present:

    • \AppID\PatchWrap.exe
    • \AppID\ProtectionUtil.dll
    • \AppID\SmcGui.exe
    • \AppID\SymNAPSHAgent.dll
    • \AppID\{4D87269F-49AB-4095-93FF-52DAD221149E}
    • \AppID\{610056EB-8561-4720-9C05-8E8C368E8779}
    • \AppID\{6425FB43-BE2A-4AC9-9B70-1C18807882D1}
    • \AppID\{CA39D995-ACA4-42B1-AABA-0C77EF20F785}
    • \CLSID\{09FA8089-EE3E-4362-B8C0-1B0F4FD0505D}
    • \CLSID\{0E4ACE4C-DB4D-42C4-83A6-9A71D9C2CC1C}
    • \CLSID\{173883C3-C6CF-4D17-9889-CDC51DCFF5E1}
    • \CLSID\{1CDDD0B9-03AA-4442-9A5B-AC98086513E1}
    • \CLSID\{1FBEF3C8-45A0-42E0-8C68-681C4EB26DF7}
    • \CLSID\{28FE5CD9-272D-442D-BA16-822126FCBD00}
    • \CLSID\{2AA55A10-1373-499B-8485-561006D1A1B0}
    • \CLSID\{2AE1F986-F3C3-4EF3-95DF-ED32AFE49510}
    • \CLSID\{2E76B2BF-C603-11D1-826C-00A0C95C0756}
    • \CLSID\{2E76B2C0-C603-11D1-826C-00A0C95C0756}
    • \CLSID\{2E76B2C3-C603-11D1-826C-00A0C95C0756}
    • \CLSID\{2E76B2C4-C603-11D1-826C-00A0C95C0756}
    • \CLSID\{327C5962-08E2-4EC6-A21A-340838D6EDB5}
    • \CLSID\{35AF7390-D827-4C1C-B7E0-8A26EC695AF5}
    • \CLSID\{3DA06333-6CF3-499D-83AE-804CB32863AA}
    • \CLSID\{40C57BF5-CA86-11D1-B782-00A0C99C7131}
    • \CLSID\{40C57BF6-CA86-11D1-B782-00A0C99C7131}
    • \CLSID\{4128E694-4BB9-11D1-8190-00A0C95C0756}
    • \CLSID\{4128E695-4BB9-11D1-8190-00A0C95C0756}
    • \CLSID\{425DC6B2-28B6-41D2-AE94-0CE5E1CE7D9F}
    • \CLSID\{43943CCA-883C-11D1-83A4-00A0C9749EEF}
    • \CLSID\{4572031A-44ED-411B-9254-76449055D796}
    • \CLSID\{47D635E3-9D14-40C9-A28C-64C2AA7AF647}
    • \CLSID\{4B37F436-A1C7-43D6-8B48-2578BFB82F9C}
    • \CLSID\{501F9014-F64A-49AD-A36D-CB8F722D3739}
    • \CLSID\{536604C2-B82E-11D1-8252-00A0C95C0756}
    • \CLSID\{536604C3-B82E-11D1-8252-00A0C95C0756}
    • \CLSID\{57BAFF80-7818-4874-9D14-0AEC89E8E713}
    • \CLSID\{592DC44C-4977-11D1-818D-00A0C95C0756}
    • \CLSID\{592DC44F-4977-11D1-818D-00A0C95C0756}
    • \CLSID\{62C95F44-F1B4-4460-A190-E0402B887BFF}
    • \CLSID\{661CE64B-B9C4-40A0-A935-8A7A512CC794}
    • \CLSID\{6C393196-AEEB-4CB0-8F8E-72EFC4C2C1CA}
    • \CLSID\{6CAD485D-61FD-4989-8BE1-22BFDBD4260B}
    • \CLSID\{72864BE2-6234-45AA-952D-00C10C34BEEE}
    • \CLSID\{74F8002D-2DF2-479E-80B9-AF7AC93DF4A7}
    • \CLSID\{7F365837-F578-11D1-B7B2-00A0C99C7131}
    • \CLSID\{7F365838-F578-11D1-B7B2-00A0C99C7131}
    • \CLSID\{7FBB7DCB-FF3D-467E-8962-7F1F58DE5B50}
    • \CLSID\{8630F7C0-73E6-4C27-80AF-6ED3A7152194}
    • \CLSID\{8BEEE74D-455E-4616-A97A-F6E86C317F32}
    • \CLSID\{8F6F6788-4009-11D1-8184-00A0C95C0756}
    • \CLSID\{921BD9FB-4963-11D1-818D-00A0C95C0756}
    • \CLSID\{94A95A15-EA82-46F5-B5BF-1176F6D77DF7}
    • \CLSID\{A302D4CF-8AAD-4B44-ADDE-7D1630CF6C37}
    • \CLSID\{A5C06558-65A3-472D-A950-B5E3324A85C7}
    • \CLSID\{AB124073-6726-461F-B219-BBD3E6DE19E1}
    • \CLSID\{ABBAB8BD-E4F1-11D1-A42C-00A0C9A243C6}
    • \CLSID\{ABBAB8BE-E4F1-11D1-A42C-00A0C9A243C6}
    • \CLSID\{AC0A837D-9BE0-49A4-9495-582AFB88A673}
    • \CLSID\{AFBBB9C6-8A99-11D1-8892-0080C75FFCC4}
    • \CLSID\{AFBBB9C7-8A99-11D1-8892-0080C75FFCC4}
    • \CLSID\{B1E8CB59-77C3-4A8D-9B0D-73A1F71C71A8}
    • \CLSID\{B91B0CAE-D866-11D1-B78C-00A0C99C7131}
    • \CLSID\{BC66531F-3136-46B0-9FEA-AC2AB3B7CF66}
    • \CLSID\{BE70B0B7-25AF-46E2-AF30-ED4EBBC1F149}
    • \CLSID\{BEE62D80-4A07-11D1-818E-00A0C95C0756}
    • \CLSID\{C05C035C-9C26-4F1E-B8BB-13F847313208}
    • \CLSID\{C0C14422-4924-41B9-971A-030CB1119C3B}
    • \CLSID\{C859248A-513E-11D1-8194-00A0C95C0756}
    • \CLSID\{C859248B-513E-11D1-8194-00A0C95C0756}
    • \CLSID\{CCD1C6CC-DCA5-448E-8C35-3BA8C6FBF99D}
    • \CLSID\{D4268CC3-BE07-4B6F-8364-B853D09FF3BD}
    • \CLSID\{E17664B2-DFBE-4654-8E40-672EC40C0276}
    • \CLSID\{EE68EAFC-BF28-4017-8A92-D17DACF0B459}
    • \CLSID\{F20393E2-7481-49A3-8543-0268AA252EA8}
    • \CLSID\{F32F2026-8607-11D1-8892-0080C75FFCC4}
    • \CLSID\{F32F2027-8607-11D1-8892-0080C75FFCC4}
    • \CLSID\{F32F202A-8607-11D1-8892-0080C75FFCC4}
    • \CLSID\{F32F202B-8607-11D1-8892-0080C75FFCC4}
    • \CLSID\{F50BD50D-952E-4C4E-BF0E-C435015C6ADD}
    • \CLSID\{FC894628-B91D-11D1-8254-00A0C95C0756}
    • \CLSID\{FC894629-B91D-11D1-8254-00A0C95C0756}
    • \CLSID\{FD49B8C4-41FE-498D-95A0-BD12BADE43A9}
    • \FwsCtrl.BrowserProtection
    • \FwsCtrl.BrowserProtection.1
    • \FwsCtrl.CAutoprotectFw
    • \FwsCtrl.CAutoprotectFw.1
    • \FwsCtrl.CCmcManagement
    • \FwsCtrl.CCmcManagement.1
    • \FwsCtrl.CNACProtection
    • \FwsCtrl.CNACProtection.1
    • \FwsCtrl.FwsProtectionProvider
    • \FwsCtrl.FwsProtectionProvider.1
    • \FwsCtrl.IpsProtection
    • \FwsCtrl.IpsProtection.1
    • \FwsCtrl.NACProtectionProvider
    • \FwsCtrl.NACProtectionProvider.1
    • \HPPProtectionProviderUI.BASHProtection
    • \HPPProtectionProviderUI.BASHProtection.1
    • \HPPProtectionProviderUI.HPPProtectionPr
    • \HPPProtectionProviderUI.HPPProtectionProvider.1
    • \INETMAILUI.InetMailUICtrl.1
    • \Interface\{002E704B-6E16-40EA-AEBA-E858BCA82B89}
    • \Interface\{2843A4DD-917F-4322-B5AA-5A262CAE143D}
    • \Interface\{3CE447DF-10EC-4852-ACDA-617BFC495716}
    • \Interface\{4D7099CB-24F4-4502-B317-56E0EDD3D378}
    • \Interface\{4DD8D82B-432C-40EF-9788-853452C20168}
    • \Interface\{501F9014-F64A-49AD-A36D-CB8F722D3739}
    • \Interface\{536604C0-B82E-11D1-8252-00A0C95C0756}
    • \Interface\{536604C1-B82E-11D1-8252-00A0C95C0756}
    • \Interface\{587162BB-EB25-423C-BE97-EFE38BB0A2AE}
    • \Interface\{667C382E-70C4-45FA-9E01-9EB0B956AB3C}
    • \Interface\{6DEE0551-3EE6-4F3A-B420-48EBABA110CB}
    • \Interface\{7006BA9F-5D2C-4344-A3C9-9F82ADDF1A73}
    • \Interface\{888B91C3-9CC9-42E2-A085-0633B463FC13}
    • \Interface\{979920CF-81B8-4C1A-988F-15355AE8AD64}
    • \Interface\{B473C0DD-AF12-4C13-9036-25D2BDCA2859}
    • \Interface\{C05C035C-9C26-4F1E-B8BB-13F847313208}
    • \Interface\{C181575D-C0D6-4E1F-B517-0E2C3C312E4B}
    • \Interface\{D0FE7F2E-0090-4237-9EA9-C432D661FF0A}
    • \Interface\{D57906B2-AA5D-4CFC-8728-296D0186776E}
    • \Interface\{D5B84A4F-1EB8-4C86-B6F9-3DA46B59891B}
    • \Interface\{D76F0CF0-AB6C-4604-8B1B-5CC305D5C289}
    • \Interface\{D7BD6E18-9468-42F5-9CAE-19B3164F635F}
    • \Interface\{D8ACF3FA-B1FD-ADB4-8660-6CAEF999B999}
    • \Interface\{D8FCD44A-B1FD-ABB4-8660-9C0EF889B752}
    • \Interface\{E4866660-DB82-4233-99A2-03F25C895214}
    • \Interface\{E7329452-FE39-4129-AB0F-5F8FD0AC628C}
    • \Interface\{EAA6B14E-CA51-4DAB-8049-96B243BD7F6E}
    • \Interface\{F0576720-A999-4A71-8ADE-61C621ED8407}
    • \Interface\{F672352D-267F-4E95-BD6F-9EB0D5791963}
    • \Interface\{FED18B74-E38E-4738-B882-0FF8D74ABEB3}
    • \LDDATETIME.LDDateCtrl.1
    • \LDDATETIME.LDStaticDateTimeCtrl.1
    • \LDDATETIME.LDTimeCtrl.1
    • \LDVPCTLS.LDVPActionsCtrl.1
    • \LDVPCTLS.LDVPEditCtrl.1
    • \LDVPCTLS.LDVPExtensionsCtrl.1
    • \LDVPCTLS.LDVPResultsCtrl.1
    • \LDVPCTLS.LDVPVirusDetailsCtrl.1
    • \LDVPDLGS.LDVPAboutDlgCtrl.1
    • \LDVPDLGS.LDVPCompressedCtrl.1
    • \LDVPDLGS.LDVPEmailNotifySettingsCtrl.1
    • \LDVPDLGS.LDVPMessageConfigCtrl.1
    • \LDVPDLGS.LDVPSchedule2Ctrl.1
    • \LDVPDLGS.LDVPSchedule3Ctrl.1
    • \LDVPDLGS.LDVPScheduleCtrl.1
    • \LDVPDLGS.LDVPStorageViewCtrl.1
    • \LDVPDLGS.LDVPThreatExclusionsDlgCtl.1
    • \LDVPUI.LDVPUICtrl.1
    • \PatchWrap.PatchWrapper
    • \PatchWrap.PatchWrapper.1
    • \ProtectionUtil.ProtectionCollection
    • \ProtectionUtil.ProtectionCollection.1
    • \ProtectionUtil.ProtectionProviderColl.1
    • \ProtectionUtil.ProtectionProviderCollec
    • \ProtectionUtil.Protection_GUID_Contai.1
    • \ProtectionUtil.Protection_GUID_Containe
    • \ProtectionUtil.StatusFinder
    • \ProtectionUtil.StatusFinder.1
    • \ProtectionUtil.StatusProblem_Autoprot.1
    • \ProtectionUtil.StatusProblem_Autoprotec
    • \ProtectionUtil.StatusProblem_BashError
    • \ProtectionUtil.StatusProblem_BashError.1
    • \ProtectionUtil.StatusProblem_Containe.1
    • \ProtectionUtil.StatusProblem_Container
    • \ProtectionUtil.StatusProblem_DAError
    • \ProtectionUtil.StatusProblem_DAError.1
    • \ProtectionUtil.StatusProblem_DAOff
    • \ProtectionUtil.StatusProblem_DAOff.1
    • \ProtectionUtil.StatusProblem_Definiti.1
    • \ProtectionUtil.StatusProblem_Definition
    • \ProtectionUtil.StatusProblem_DefsCorr.1
    • \ProtectionUtil.StatusProblem_DefsCorrup
    • \ProtectionUtil.StatusProblem_HostInte.1
    • \ProtectionUtil.StatusProblem_HostIntegr
    • \ProtectionUtil.StatusProblem_NetworkA.1
    • \ProtectionUtil.StatusProblem_NetworkAcc
    • \ProtectionUtil.StatusProblem_NetworkQ.1
    • \ProtectionUtil.StatusProblem_NetworkQua
    • \ProtectionUtil.StatusProblem_Provider.1
    • \ProtectionUtil.StatusProblem_ProviderAu
    • \ProtectionUtil.StatusProblem_ProviderEr
    • \ProtectionUtil.StatusProblem_ProviderOf
    • \ProtectionUtil.StatusProblem_RebootPending
    • \ProtectionUtil.StatusProblem_RebootPending.1
    • \ProtectionUtil.StatusProblem_Trialwar.1
    • \ProtectionUtil.StatusProblem_TrialwareE
    • \SavMainUI.ConfigureableScanCollection
    • \SavMainUI.ConfigureableScanCollection.1
    • \SymNAPSHAgent.CSymNAPSHAgentComponentInfo
    • \TypeLib\{2E76B2B4-C603-11D1-826C-00A0C95C0756}
    • \TypeLib\{536604BF-B82E-11D1-8252-00A0C95C0756}
    • \TypeLib\{592DC449-4977-11D1-818D-00A0C95C0756}
    • \TypeLib\{7F1806A6-1864-4697-A06B-E36F41D75DEF}
    • \TypeLib\{A559E5DA-F585-4590-AAC4-E00737E19425}
    • \TypeLib\{F32F2023-8607-11D1-8892-0080C75FFCC4}
  6. Go to HKEY_LOCAL_MACHINE\SOFTWARE\Classes, and delete the subkeys listed in step 5.

  7. Go to HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node, and delete the subkeys listed in step 5.

  8. Go to HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432node\Classes, and delete the subkeys listed in step 5.

  9. Go to the following key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall

  10. Select Uninstall.

  11. Click EditFind, then type symantec.Click Find Next.

  12. Check for any values appearing in the right pane that include the word Symantec, in a key that is still in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall.
    If the key that is selected is still in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall, delete the key (in the left pane) – this key will be in the form of a 24 character alphanumeric GUID surrounded by {} brackets. Then repeat the search.
    If the key that is selected is not in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall, continue to the next step.
  13. Remove any values with "Symantec" in the path from the following key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDlls

  14. Use Edit > Find to search for any instances of the following strings, and delete any registry values that contain them or have the string as the name:

    • Vpshell2

    • VpShellEx

 

To find and remove the product GUID

  1. In the Windows registry editor, go to the following key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\

  2. Click Products to highlight it.

  3. On the Edit menu, click Find.

  4. Type Symantec Network Access Control.

  5. Click Find Next.

  6. A value appears in the right pane that includes the words Symantec Endpoint Protection, in a key named "InstallProperties". The "InstallProperties" key resides within another key whose name is a hexadecimal string. This hexadecimal string is the product GUID.

  7. Use Edit > Find to search for any instances of the product GUID, and delete any registry values that contain it or have the string as the name.

 

To restore default Windows network settings

  1. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetworkProvider\HwOrder.

  2. Edit the ProviderOrder value to remove SnacNp from the list.

  3. Repeat step 2 for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetworkProvider\Order.

  4. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\PPP\EAP.

  5. In the 13 key, delete the following values:

    • ConfigUIPath

    • IdentityPath

    • InteractiveUIPath

    • Path

  6. Rename the ConfigUIPathBackup, IdentityPathBackup, InteractiveUIPathBackup, and PathBackup values to ConfigUIPath, IdentityPath, InteractiveUIPath, and Path respectively.

  7. Repeat steps 5 and 6 for the 25, 26, and 4 keys.

  8. Delete the key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\PPP\EAP\88.

 

Remove Symantec Network Access Control files and folders

  1. Restart the computer into Safe Mode. To enter Safe Mode on Windows Vista and Windows 7, read the Microsoft article Start your computer in safe mode.

  2. In Safe Mode, log on as the Administrator account.

  3. Delete the following files and folders.

    • C:\Program Files (x86)\Symantec\Symantec Endpoint Protection (Or the appropriate directory if you installed in a different one)
    • C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Symantec Endpoint Protection
    • C:\Windows\System32\drivers\SEP
    • %systemdrive%\System Volume Information\EfaData (you will have to change the permissions from read-only to gain access)
  4. Delete the following driver files in both C:\Windows\System32\drivers and C:\Windows\SysWOW64\drivers. In all cases delete the files with the extensions .sys, .cat, and .inf with the following prefixes:

    • SYMEVENT
    • SysPlant
    • Teefer
    • WGX
  5. Delete the following driver files in both C:\Windows\System32 and C:\Windows\SysWOW64:

    • FwsVpn.dll
    • SysFer.dll
    • snacnp.dll
    • SysFerThunk.dll
    • SymVPN.dll
  6. Go to C:\Windows\Installer\.

  7. For each file in C:\Windows\Installer, right-click the file and select Properties.

  8. On the Summary tab, check to see whether the file was created by Symantec. If it was, delete the file.

  9. Repeat steps 6-9 for every file in the folder.


Remove the Teefer driver

  1. Click Start > Search, type cmd, and press Ctrl+Shift+Enter to start a command prompt with Administrator privileges.

  2. Type pnputil -e to list the Symantec drivers in the driver store.

  3. Type pnputil -f -d oem<n>.inf to remove Symantec drivers from driver store, where <n> is a number corresponding to one of the Symantec drivers listed in the previous step.

  4. Type exit to close the command prompt.

  5. In the Windows registry editor, navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}.

  6. Delete any keys that have a value of ComponentId that is set to symc_teefer2mp.

  7. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceClasses\{ad498944-762f-11d0-8dcb-00c04fc3358c}.

  8. Delete any sub keys that have a name containing SYMC_TEEFERMP.

  9. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceClasses\{cac88424-7515-4c03-82e6-71a87abac361}.

  10. Delete any sub keys that have a name containing SYMC_TEEFERMP.

  11. Close the Windows Registry Editor.

  12. In the Device Manager (devmgmt.msc), go to Network Adapters, and delete all entries with "teefer" in them.

  13. Delete any network adapters to which teefer was attached.
    This causes the adapters to be reinstalled. This step must be done in order for there to be network connectivity after you restart the computer.

  14. Restart the computer into normal mode.

 

 

 

 



Article URL http://www.symantec.com/docs/HOWTO55826


Terms of use for this information are found in Legal Notices