How to manually uninstall Symantec Network Access Control (SNAC) 12.1 client from 32 and 64 bit Operating Systems

Article:HOWTO55828  |  Created: 2011-06-30  |  Updated: 2012-03-02  |  Article URL http://www.symantec.com/docs/HOWTO55828
Article Type
How To



This document describes how to remove Symantec Network Access Control (SNAC) client from Windows XP and 2003 based operating systems, both x86 (32 bit) and x64 (64 bit), manually.

Warning: The manual removal steps outlined below can disable any other Symantec products that are installed on the computer. It is recommended that all Symantec products be uninstalled by using Add or Remove Programs before starting this process. Manual uninstall via file removal and registry manipulation should only be attempted as a last resort after first running traditional removal through Add or Remove Programs, and if that does not work, by using CleanWipe.

Not all files, folders, registry keys, or registry values may be present. If an entry does not exist, move on to the next one.

 

To stop the Windows Installer service
  1. Click Start > Run.
  2. Type services.msc and click OK.
  3. Right-click Windows Installer, and then click Properties.
  4. Under Startup Type, click Disabled.
  5. Close the Services window.

To stop Symantec Network Access Control (SNAC)
  1. Click Start > Run.
  2. Type msconfig and click OK.
  3. On the Startup tab, uncheck ccapp.
  4. On the Services tab, uncheck the following:
    • Symantec Event Manager
    • Symantec Settings Manager
    • Liveupdate
    • Symantec Management Client
    • Symantec Network Access Control
    • Symantec Endpoint Protection
  5. Click OK.
  6. Click Start > Run.
  7. Type regedit and Click OK.
  8. Navigate to the following key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SepMasterService
  9. Change the Start value to 4.
  10. Repeat steps 8 for the following keys:
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SmcService
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SNAC
  11. Restart the computer.
  12. After you restart the computer, a message appears. Check the box and click OK.

To remove the Teefer driver
  1. Click Start > Settings > Control Panel > Network Connections.
    You will need to repeat the following steps for each entry in Network Connections:
  2. Click a connection.
  3. In the dialog, click Properties.
  4. Select Teefer Driver and click Uninstall.
  5. Repeat with other connections as needed.
  6. Restart the computer.

To remove Symantec Network Access Control (SNAC) from the registry
  1. Click Start > Run.
  2. Type regedit and Click OK.
  3. In the Windows registry editor, in the left pane, delete the following keys if they are present.
    • HKEY_CURRENT_USER\Software\Symantec\Symantec Endpoint Protection
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\BHDrvx86
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IDSVix86
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\NAVENG
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\NAVEX15
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SepMasterService
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SmcService
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SNAC
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SnacNp
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SRTSP
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SRTSPX
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SyDvCtrl
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SymDS
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SymEFA
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SymEvent
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SymIRON
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SYMNETS
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SysPlant
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Teefer2
  4. In the Windows registry editor, in the left pane, delete the following keys if they are present. Replace [path] with HKEY_LOCAL_MACHINE\SOFTWARE
    • [path] \Microsoft\Windows\CurrentVersion\App Paths\Smc.exe
    • [path] \Symantec\Symantec Endpoint Protection
  5. Repeat step 4, replacing [path] with HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432node
  6. In the Windows registry editor, in the left pane, delete the following keys if they are present. Replace [path] with HKEY_CLASSES_ROOT.
    • [path]\AppID\PatchWrap.exe
    • [path]\AppID\ProtectionUtil.dll
    • [path]\AppID\SmcGui.exe
    • [path]\AppID\SymNAPSHAgent.dll
    • [path]\AppID\{4D87269F-49AB-4095-93FF-52DAD221149E}
    • [path]\AppID\{610056EB-8561-4720-9C05-8E8C368E8779}
    • [path]\AppID\{6425FB43-BE2A-4AC9-9B70-1C18807882D1}
    • [path]\AppID\{CA39D995-ACA4-42B1-AABA-0C77EF20F785}
    • [path]\CLSID\{09FA8089-EE3E-4362-B8C0-1B0F4FD0505D}
    • [path]\CLSID\{0E4ACE4C-DB4D-42C4-83A6-9A71D9C2CC1C}
    • [path]\CLSID\{173883C3-C6CF-4D17-9889-CDC51DCFF5E1}
    • [path]\CLSID\{1CDDD0B9-03AA-4442-9A5B-AC98086513E1}
    • [path]\CLSID\{1FBEF3C8-45A0-42E0-8C68-681C4EB26DF7}
    • [path]\CLSID\{28FE5CD9-272D-442D-BA16-822126FCBD00}
    • [path]\CLSID\{2AA55A10-1373-499B-8485-561006D1A1B0}
    • [path]\CLSID\{2AE1F986-F3C3-4EF3-95DF-ED32AFE49510}
    • [path]\CLSID\{2E76B2BF-C603-11D1-826C-00A0C95C0756}
    • [path]\CLSID\{2E76B2C0-C603-11D1-826C-00A0C95C0756}
    • [path]\CLSID\{2E76B2C3-C603-11D1-826C-00A0C95C0756}
    • [path]\CLSID\{2E76B2C4-C603-11D1-826C-00A0C95C0756}
    • [path]\CLSID\{327C5962-08E2-4EC6-A21A-340838D6EDB5}
    • [path]\CLSID\{35AF7390-D827-4C1C-B7E0-8A26EC695AF5}
    • [path]\CLSID\{3DA06333-6CF3-499D-83AE-804CB32863AA}
    • [path]\CLSID\{40C57BF5-CA86-11D1-B782-00A0C99C7131}
    • [path]\CLSID\{40C57BF6-CA86-11D1-B782-00A0C99C7131}
    • [path]\CLSID\{4128E694-4BB9-11D1-8190-00A0C95C0756}
    • [path]\CLSID\{4128E695-4BB9-11D1-8190-00A0C95C0756}
    • [path]\CLSID\{425DC6B2-28B6-41D2-AE94-0CE5E1CE7D9F}
    • [path]\CLSID\{43943CCA-883C-11D1-83A4-00A0C9749EEF}
    • [path]\CLSID\{4572031A-44ED-411B-9254-76449055D796}
    • [path]\CLSID\{47D635E3-9D14-40C9-A28C-64C2AA7AF647}
    • [path]\CLSID\{4B37F436-A1C7-43D6-8B48-2578BFB82F9C}
    • [path]\CLSID\{501F9014-F64A-49AD-A36D-CB8F722D3739}
    • [path]\CLSID\{536604C2-B82E-11D1-8252-00A0C95C0756}
    • [path]\CLSID\{536604C3-B82E-11D1-8252-00A0C95C0756}
    • [path]\CLSID\{57BAFF80-7818-4874-9D14-0AEC89E8E713}
    • [path]\CLSID\{592DC44C-4977-11D1-818D-00A0C95C0756}
    • [path]\CLSID\{592DC44F-4977-11D1-818D-00A0C95C0756}
    • [path]\CLSID\{62C95F44-F1B4-4460-A190-E0402B887BFF}
    • [path]\CLSID\{661CE64B-B9C4-40A0-A935-8A7A512CC794}
    • [path]\CLSID\{6C393196-AEEB-4CB0-8F8E-72EFC4C2C1CA}
    • [path]\CLSID\{6CAD485D-61FD-4989-8BE1-22BFDBD4260B}
    • [path]\CLSID\{72864BE2-6234-45AA-952D-00C10C34BEEE}
    • [path]\CLSID\{74F8002D-2DF2-479E-80B9-AF7AC93DF4A7}
    • [path]\CLSID\{7F365837-F578-11D1-B7B2-00A0C99C7131}
    • [path]\CLSID\{7F365838-F578-11D1-B7B2-00A0C99C7131}
    • [path]\CLSID\{7FBB7DCB-FF3D-467E-8962-7F1F58DE5B50}
    • [path]\CLSID\{8630F7C0-73E6-4C27-80AF-6ED3A7152194}
    • [path]\CLSID\{8BEEE74D-455E-4616-A97A-F6E86C317F32}
    • [path]\CLSID\{8F6F6788-4009-11D1-8184-00A0C95C0756}
    • [path]\CLSID\{921BD9FB-4963-11D1-818D-00A0C95C0756}
    • [path]\CLSID\{94A95A15-EA82-46F5-B5BF-1176F6D77DF7}
    • [path]\CLSID\{A302D4CF-8AAD-4B44-ADDE-7D1630CF6C37}
    • [path]\CLSID\{A5C06558-65A3-472D-A950-B5E3324A85C7}
    • [path]\CLSID\{AB124073-6726-461F-B219-BBD3E6DE19E1}
    • [path]\CLSID\{ABBAB8BD-E4F1-11D1-A42C-00A0C9A243C6}
    • [path]\CLSID\{ABBAB8BE-E4F1-11D1-A42C-00A0C9A243C6}
    • [path]\CLSID\{AC0A837D-9BE0-49A4-9495-582AFB88A673}
    • [path]\CLSID\{AFBBB9C6-8A99-11D1-8892-0080C75FFCC4}
    • [path]\CLSID\{AFBBB9C7-8A99-11D1-8892-0080C75FFCC4}
    • [path]\CLSID\{B1E8CB59-77C3-4A8D-9B0D-73A1F71C71A8}
    • [path]\CLSID\{B91B0CAE-D866-11D1-B78C-00A0C99C7131}
    • [path]\CLSID\{BC66531F-3136-46B0-9FEA-AC2AB3B7CF66}
    • [path]\CLSID\{BE70B0B7-25AF-46E2-AF30-ED4EBBC1F149}
    • [path]\CLSID\{BEE62D80-4A07-11D1-818E-00A0C95C0756}
    • [path]\CLSID\{C05C035C-9C26-4F1E-B8BB-13F847313208}
    • [path]\CLSID\{C0C14422-4924-41B9-971A-030CB1119C3B}
    • [path]\CLSID\{C859248A-513E-11D1-8194-00A0C95C0756}
    • [path]\CLSID\{C859248B-513E-11D1-8194-00A0C95C0756}
    • [path]\CLSID\{CCD1C6CC-DCA5-448E-8C35-3BA8C6FBF99D}
    • [path]\CLSID\{D4268CC3-BE07-4B6F-8364-B853D09FF3BD}
    • [path]\CLSID\{E17664B2-DFBE-4654-8E40-672EC40C0276}
    • [path]\CLSID\{EE68EAFC-BF28-4017-8A92-D17DACF0B459}
    • [path]\CLSID\{F20393E2-7481-49A3-8543-0268AA252EA8}
    • [path]\CLSID\{F32F2026-8607-11D1-8892-0080C75FFCC4}
    • [path]\CLSID\{F32F2027-8607-11D1-8892-0080C75FFCC4}
    • [path]\CLSID\{F32F202A-8607-11D1-8892-0080C75FFCC4}
    • [path]\CLSID\{F32F202B-8607-11D1-8892-0080C75FFCC4}
    • [path]\CLSID\{F50BD50D-952E-4C4E-BF0E-C435015C6ADD}
    • [path]\CLSID\{FC894628-B91D-11D1-8254-00A0C95C0756}
    • [path]\CLSID\{FC894629-B91D-11D1-8254-00A0C95C0756}
    • [path]\CLSID\{FD49B8C4-41FE-498D-95A0-BD12BADE43A9}
    • [path]\FwsCtrl.BrowserProtection
    • [path]\FwsCtrl.BrowserProtection.1
    • [path]\FwsCtrl.CAutoprotectFw
    • [path]\FwsCtrl.CAutoprotectFw.1
    • [path]\FwsCtrl.CCmcManagement
    • [path]\FwsCtrl.CCmcManagement.1
    • [path]\FwsCtrl.CNACProtection
    • [path]\FwsCtrl.CNACProtection.1
    • [path]\FwsCtrl.FwsProtectionProvider
    • [path]\FwsCtrl.FwsProtectionProvider.1
    • [path]\FwsCtrl.IpsProtection
    • [path]\FwsCtrl.IpsProtection.1
    • [path]\FwsCtrl.NACProtectionProvider
    • [path]\FwsCtrl.NACProtectionProvider.1
    • [path]\HPPProtectionProviderUI.BASHProtection
    • [path]\HPPProtectionProviderUI.BASHProtection.1
    • [path]\HPPProtectionProviderUI.HPPProtectionPr
    • [path]\HPPProtectionProviderUI.HPPProtectionProvider.1
    • [path]\INETMAILUI.InetMailUICtrl.1
    • [path]\Interface\{002E704B-6E16-40EA-AEBA-E858BCA82B89}
    • [path]\Interface\{2843A4DD-917F-4322-B5AA-5A262CAE143D}
    • [path]\Interface\{3CE447DF-10EC-4852-ACDA-617BFC495716}
    • [path]\Interface\{4D7099CB-24F4-4502-B317-56E0EDD3D378}
    • [path]\Interface\{4DD8D82B-432C-40EF-9788-853452C20168}
    • [path]\Interface\{501F9014-F64A-49AD-A36D-CB8F722D3739}
    • [path]\Interface\{536604C0-B82E-11D1-8252-00A0C95C0756}
    • [path]\Interface\{536604C1-B82E-11D1-8252-00A0C95C0756}
    • [path]\Interface\{587162BB-EB25-423C-BE97-EFE38BB0A2AE}
    • [path]\Interface\{667C382E-70C4-45FA-9E01-9EB0B956AB3C}
    • [path]\Interface\{6DEE0551-3EE6-4F3A-B420-48EBABA110CB}
    • [path]\Interface\{7006BA9F-5D2C-4344-A3C9-9F82ADDF1A73}
    • [path]\Interface\{888B91C3-9CC9-42E2-A085-0633B463FC13}
    • [path]\Interface\{979920CF-81B8-4C1A-988F-15355AE8AD64}
    • [path]\Interface\{B473C0DD-AF12-4C13-9036-25D2BDCA2859}
    • [path]\Interface\{C05C035C-9C26-4F1E-B8BB-13F847313208}
    • [path]\Interface\{C181575D-C0D6-4E1F-B517-0E2C3C312E4B}
    • [path]\Interface\{D0FE7F2E-0090-4237-9EA9-C432D661FF0A}
    • [path]\Interface\{D57906B2-AA5D-4CFC-8728-296D0186776E}
    • [path]\Interface\{D5B84A4F-1EB8-4C86-B6F9-3DA46B59891B}
    • [path]\Interface\{D76F0CF0-AB6C-4604-8B1B-5CC305D5C289}
    • [path]\Interface\{D7BD6E18-9468-42F5-9CAE-19B3164F635F}
    • [path]\Interface\{D8ACF3FA-B1FD-ADB4-8660-6CAEF999B999}
    • [path]\Interface\{D8FCD44A-B1FD-ABB4-8660-9C0EF889B752}
    • [path]\Interface\{E4866660-DB82-4233-99A2-03F25C895214}
    • [path]\Interface\{E7329452-FE39-4129-AB0F-5F8FD0AC628C}
    • [path]\Interface\{EAA6B14E-CA51-4DAB-8049-96B243BD7F6E}
    • [path]\Interface\{F0576720-A999-4A71-8ADE-61C621ED8407}
    • [path]\Interface\{F672352D-267F-4E95-BD6F-9EB0D5791963}
    • [path]\Interface\{FED18B74-E38E-4738-B882-0FF8D74ABEB3}
    • [path]\LDDATETIME.LDDateCtrl.1
    • [path]\LDDATETIME.LDStaticDateTimeCtrl.1
    • [path]\LDDATETIME.LDTimeCtrl.1
    • [path]\LDVPCTLS.LDVPActionsCtrl.1
    • [path]\LDVPCTLS.LDVPEditCtrl.1
    • [path]\LDVPCTLS.LDVPExtensionsCtrl.1
    • [path]\LDVPCTLS.LDVPResultsCtrl.1
    • [path]\LDVPCTLS.LDVPVirusDetailsCtrl.1
    • [path]\LDVPDLGS.LDVPAboutDlgCtrl.1
    • [path]\LDVPDLGS.LDVPCompressedCtrl.1
    • [path]\LDVPDLGS.LDVPEmailNotifySettingsCtrl.1
    • [path]\LDVPDLGS.LDVPMessageConfigCtrl.1
    • [path]\LDVPDLGS.LDVPSchedule2Ctrl.1
    • [path]\LDVPDLGS.LDVPSchedule3Ctrl.1
    • [path]\LDVPDLGS.LDVPScheduleCtrl.1
    • [path]\LDVPDLGS.LDVPStorageViewCtrl.1
    • [path]\LDVPDLGS.LDVPThreatExclusionsDlgCtl.1
    • [path]\LDVPUI.LDVPUICtrl.1
    • [path]\PatchWrap.PatchWrapper
    • [path]\PatchWrap.PatchWrapper.1
    • [path]\ProtectionUtil.ProtectionCollection
    • [path]\ProtectionUtil.ProtectionCollection.1
    • [path]\ProtectionUtil.ProtectionProviderColl.1
    • [path]\ProtectionUtil.ProtectionProviderCollec
    • [path]\ProtectionUtil.Protection_GUID_Contai.1
    • [path]\ProtectionUtil.Protection_GUID_Containe
    • [path]\ProtectionUtil.StatusFinder
    • [path]\ProtectionUtil.StatusFinder.1
    • [path]\ProtectionUtil.StatusProblem_Autoprot.1
    • [path]\ProtectionUtil.StatusProblem_Autoprotec
    • [path]\ProtectionUtil.StatusProblem_BashError
    • [path]\ProtectionUtil.StatusProblem_BashError.1
    • [path]\ProtectionUtil.StatusProblem_Containe.1
    • [path]\ProtectionUtil.StatusProblem_Container
    • [path]\ProtectionUtil.StatusProblem_DAError
    • [path]\ProtectionUtil.StatusProblem_DAError.1
    • [path]\ProtectionUtil.StatusProblem_DAOff
    • [path]\ProtectionUtil.StatusProblem_DAOff.1
    • [path]\ProtectionUtil.StatusProblem_Definiti.1
    • [path]\ProtectionUtil.StatusProblem_Definition
    • [path]\ProtectionUtil.StatusProblem_DefsCorr.1
    • [path]\ProtectionUtil.StatusProblem_DefsCorrup
    • [path]\ProtectionUtil.StatusProblem_HostInte.1
    • [path]\ProtectionUtil.StatusProblem_HostIntegr
    • [path]\ProtectionUtil.StatusProblem_NetworkA.1
    • [path]\ProtectionUtil.StatusProblem_NetworkAcc
    • [path]\ProtectionUtil.StatusProblem_NetworkQ.1
    • [path]\ProtectionUtil.StatusProblem_NetworkQua
    • [path]\ProtectionUtil.StatusProblem_Provider.1
    • [path]\ProtectionUtil.StatusProblem_ProviderAu
    • [path]\ProtectionUtil.StatusProblem_ProviderEr
    • [path]\ProtectionUtil.StatusProblem_ProviderOf
    • [path]\ProtectionUtil.StatusProblem_RebootPending
    • [path]\ProtectionUtil.StatusProblem_RebootPending.1
    • [path]\ProtectionUtil.StatusProblem_Trialwar.1
    • [path]\ProtectionUtil.StatusProblem_TrialwareE
    • [path]\SavMainUI.ConfigureableScanCollection
    • [path]\SavMainUI.ConfigureableScanCollection.1
    • [path]\SymNAPSHAgent.CSymNAPSHAgentComponentInfo
    • [path]\TypeLib\{2E76B2B4-C603-11D1-826C-00A0C95C0756}
    • [path]\TypeLib\{536604BF-B82E-11D1-8252-00A0C95C0756}
    • [path]\TypeLib\{592DC449-4977-11D1-818D-00A0C95C0756}
    • [path]\TypeLib\{7F1806A6-1864-4697-A06B-E36F41D75DEF}
    • [path]\TypeLib\{A559E5DA-F585-4590-AAC4-E00737E19425}
    • [path]\TypeLib\{F32F2023-8607-11D1-8892-0080C75FFCC4}
  7. Repeat step 6, replacing [path] with HKEY_LOCAL_MACHINE\SOFTWARE\Classes
  8. Repeat step 6, replacing [path] with HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node
  9. Repeat step 6, replacing [path] with HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432node\Classes
  10. Navigate to the following key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
  11. Select Uninstall.
  12. Select Edit
  13. Click Find.
  14. Type symantec
  15. Click Find Next.
    Check for any values appearing in the right pane that include the word Symantec, in a key that is still in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall.
    If the key that is selected is still in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall, delete the key (in the left pane) – it will be in the form of a 24 character alphanumeric GUID surrounded by {} brackets. Then repeat the search.
    If the key that is selected is not in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall, continue to the next step.
  16. Remove any values with "Symantec" in the path from the following key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDlls
     
  17. Navigate to the following key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\
  18. Select Products
  19. Select Edit
  20. Click Find
  21. Type Symantec Network Access Control
  22. Click Find Next.
    A value appears in the right pane that includes the words Symantec Network Access Control, in a key named "InstallProperties". The "InstallProperties" key resides within another key whose name is a hexadecimal string. Use this hexadecimal string as the value for {PRODUCT.EN_US} for the remainder of this tutorial. [Example: {PRODUCT.EN_US}= B5F96BC646091CA4B9FC8F731AD47FA5 for build 12.1.598.4692]
  23. In the Windows registry editor, in the left pane, delete the following key
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\{PRODUCT.EN_US}
  24. Search for the following strings, and delete any registry keys that contain them or any registry keys which have the string as the name:
    • {PRODUCT.EN_US}
    • Vpshell2
    • VpShellEx

 

To restore default Windows network settings

  1. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetworkProvider\HwOrder.

  2. Edit the ProviderOrder value to remove SnacNp from the list.

  3. Repeat step 2 for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetworkProvider\Order.

  4. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\PPP\EAP.

  5. In the 13 key, delete the following values:

    • ConfigUIPath

    • IdentityPath

    • InteractiveUIPath

    • Path

  6. Rename the ConfigUIPathBackup, IdentityPathBackup, InteractiveUIPathBackup, and PathBackup values to ConfigUIPath, IdentityPath, InteractiveUIPath, and Path respectively.

  7. Repeat steps 5 and 6 for the 25, 26, and 4 keys.

  8. Delete the key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\PPP\EAP\88.

 

To remove Symantec Network Access Control files and folders
  1. Delete the following files and folders.
    • C:\Program Files (x86)\Symantec\Symantec Endpoint Protection (Or the appropriate directory if you installed in a different one)
    • C:\Documents and Settings\All Users\Start Menu\Programs\Symantec Endpoint Protection
    • C:\Windows\System32\drivers\SEP
    • %systemdrive%\System Volume Information\EfaData (you will have to change the permissions from read-only to gain access)
  2. Delete the following driver files in both C:\Windows\System32\drivers and C:\Windows\SysWOW64\drivers. In all cases delete the files with the extensions .sys, .cat, and .inf with the following prefixes:
    • SYMEVENT
    • SysPlant
    • Teefer
    • WGX
  3. Delete the following driver files in both C:\Windows\System32 and C:\Windows\SysWOW64:
    • FwsVpn.dll
    • S32EVNT1.dll
    • snacnp.dll
    • SysFer.dll
    • SysFerThunk.dll
    • SymVPN.dll
  4. Go to C:\Windows\Installer\.
  5. For each file in C:\Windows\Installer, right-click the file and select Properties.
  6. On the Summary tab, check to see whether the file was created by Symantec. If it was, delete the file.
  7. Repeat steps 4-7 for every file in the folder.

To start the Windows Installer service
  1. Click Start > Run.
  2. Type services.msc and click OK.
  3. Right-click Windows Installer, and then click Properties.
  4. Under Startup Type, click Manual.
  5. Close the Services window.
Restart the machine

 

 



Article URL http://www.symantec.com/docs/HOWTO55828


Terms of use for this information are found in Legal Notices