82,399,351 programs installed

Should I remove Check Point Endpoint Security?

What percent of users and experts removed it?
9% remove it91% keep it
Overall Sentiment
Good
What do people think about it?
(click star to rate)
How common is it?
Global Rank #49,751
Reach 0.0015%
Lifespan of installation (until removal)
< 10.18 days
300.25 days >
Average installed length: 157.76 days

Versions

VersionDistribution
8.1.205 23.81%
8.1.005 23.81%
8.0.995 4.76%
8.0.993 4.76%
8.0.986 28.57%
8.0.768 4.76%
8.0.757 9.52%

Other programs by Check Point, Inc

Check Point Endpoint Security

What is Check Point Endpoint Security?  (from Check Point, Inc)

Check Point Endpoint Security is the first and only single agent that combines all critical components for total security on the endpoint while maintaining a transparent user experience. Market-leading data security prevents corporate data loss, while collaborative endpoint and network protections reduce complexity and...  Read more

Overview

Check Point Endpoint Security is a program developed by Check Point, Inc. The most used version is 8.0.986, with over 98% of all installations currently using this version. Upon installation and setup, it defines an auto-start registry entry which makes this program run on each Windows boot for all user logins. It adds a background controller service that is set to automatically run. Delaying the start of this service is possible through the service manager. When installed, it will add a context menu handler to the Windows shell in order to provide quick access to the program. The software installer includes 115 files and is usually about 8.59 MB (9,006,447 bytes). In comparison to the total number of users, most PCs are running the OS Windows 7 (SP1) as well as Windows XP. While about 27% of users of Check Point Endpoint Security come from the United States, it is also popular in Germany and Colombia.

Program detailsProgram details

URL: www.checkpoint.com
Installation folder: C:\Program Files\CheckPoint\Endpoint Security\
Uninstaller: MsiExec.exe /X{5FD8241D-2247-42A6-8778-A75195DE8DC6}
(The Windows Installer is used for the installation, maintenance, and removal.)
Estimated size: 8.59 MB
Language: English (United States)

Program filesFiles installed by Check Point Endpoint Security

  • icslta.dll - Integrity Clientless Security (Lightweight Trust Agent)
  • TrGUI.exe - Check Point Endpoint Security (Check Point Endpoint Security GUI)
  • fdeinstalldll.dll - Full Disk Encryption (Full Disk Encryption, Install DLL)
  • BladeFoundation.dll - End Point Security (Check Point Blade Foundation API)
  • commonclientsettings.dll - CheckPoint Common Client Settings Module
  • Compliance.exe - Check Point Compliance Blade
  • comsecurityps.dll - Check Point COMSecurity proxy/stub
  • cpda.exe - Check Point Endpoint Agent
  • cppsm.dll - Check Point Policy Storage Module
  • DADSMSupport.dll - DSM support
  • daf_dsm.dll
  • daf_logger.dll
  • ep_cdt.exe - CheckPoint Service
  • Epilogue.dll - Check Point Endpoint Debug Logging API
  • idafserver.dll
  • idafserverhostservice.exe - Check Point Device Auxiliary Framework for Endpoint Security
  • multiscan.exe - multiscan feature plug-in
  • policyactivation.dll - Check Point Policy Activation Module
  • providerstore.dll - Check Point Provider Store Module
  • SecureAccessDSM.dll - Check Point Network Protection Device Service Module
  • uepmlogschemalib.dll
  • uepmlogxformlib.dll
  • zdx.dll
  • zlavscan.dll - zlavscan shell extension
  • kerberosclient.dll - KerberosClient
  • kerberoscommon.dll - KerberosAuth
  • CertEnrollProxy.dll - cpcapivista
  • cpinfo.exe - cpinfo_ep
  • cpopenssl.dll - cpopenssl
  • iitoolbox.dll - IItoolBox
  • cpbcrypt.dll - cpcrypto
  • cpcert.dll
  • cpcryptutil.dll
  • cpprng.dll
  • dnuninst.exe - dnuninst
  • findmsi.dll - MSIUtils
  • preupg.dll
  • regerror.dll
  • TracCAPI.exe
  • libcurl.dll - libcurl
  • cplogluuid.dll - cplog
  • cplogrepository.dll
  • cpregsvr.exe - srvis
  • cpsrvis.dll
  • SCUIAPI.dll - raapi
  • apputils.dll - cpis
  • command_line.exe - trac
  • comutils.dll
  • cp_version_info.dll
  • cpmsi_tool.exe
  • cpvinfo.exe
  • datastruct.dll
  • encode.dll
  • eventutils.dll
  • openmail.exe - rais
  • os.dll
  • produtils.dll
  • resolve.dll
  • TracSrvWrapper.exe
  • TrAPI.dll
  • update_config_tool.exe

Program behaviorsBehaviors exhibited

Context Menu Handler
  • zlavscan.dll added to Windows Explorer under the name 'ZLAVShExt' with a class of {D9872D13-7651-4471-9EEE-F0A00218BEBB}.
4 Services
  • IDAFServerHostService.exe runs as a service named 'Check Point Device Auxiliary Framework' (Check Point Device Auxiliary Framework) "Check Point Device Auxiliary Framework Host".
  • cpda.exe runs as a service named 'Check Point Endpoint Agent' (CPDA) "Check Point connection service".
  • Compliance.exe runs as a service named 'Check Point Endpoint Security Compliance' (CPCompliance) "Checks conformance of the computer to the security policies".
  • TracSrvWrapper.exe runs as a service named 'Check Point Endpoint Connect' (TracSrvWrapper).
Startup File (All Users Run)
  • TrGUI.exe is loaded in the all users (HKLM) registry as a startup file name 'Check Point Endpoint Security' which loads as C:\Program Files\CheckPoint\Endpoint Security\Endpoint Connect\TrGUI.exe.

How do I remove Check Point Endpoint Security?

Quickly and completely remove Check Point Endpoint Security from your computer by downloading "Should I Remove It?", its 100% FREE and installs in seconds (click the button below).
Or, you can uninstall Check Point Endpoint Security from your computer by using the Add/Remove Program feature in the Window's Control Panel.
  1. On the Start menu (for Windows 8, right-click the screen's bottom-left corner), click Control Panel, and then, under Programs, do one of the following:
    • Windows Vista/7/8: Click Uninstall a Program.
    • Windows XP: Click Add or Remove Programs.
  2. When you find the program Check Point Endpoint Security, click it, and then do one of the following:
    • Windows Vista/7/8: Click Uninstall.
    • Windows XP: Click the Remove or Change/Remove tab (to the right of the program).
  3. Follow the prompts. A progress bar shows you how long it will take to remove Check Point Endpoint Security.

OS VERSIONS
Win 7 (SP1) 90%
Win XP 10%
 
HOW IT STARTS
Automatically starts? Yes
(Found in the run registry)
 
USER ACTIONS
Uninstall it 9%
Keep it 91%

Windows OS versionsWindows

Which Windows OS versions does it run on?
Windows 7 90.48%
Windows XP 9.52%
Which OS releases does it run on?
Windows 7 Professional 61.90%
Windows 7 Enterprise 14.29%
Microsoft Windows XP 9.52%
Windows 7 Home Premium 9.52%
Windows 7 Ultimate 4.76%

Distribution by countryGeography

26.92% of installs come from the United States
Which countries install it?
  United States 26.92%
  Germany 11.54%
  Colombia 7.69%
  Italy 7.69%
  South Africa 3.85%
  UA 3.85%
  Belgium 3.85%
  India 3.85%
  Mexico 3.85%
  Greece 3.85%
  Israel 3.85%
  Netherlands 3.85%
  DK 3.85%
  Canada 3.85%

OEM distributionPC manufacturers

What PC manufacturers (OEMs) have it installed?
Dell 36.84%
Hewlett-Packard 26.32%
Lenovo 15.79%
Acer 10.53%
Intel 5.26%
GIGABYTE 5.26%
Common models
O.E.M O.E.M 5.00%
LENOVO 2441AB5 5.00%
HP Z600 Workstation 5.00%
Dell Latitude E6420 5.00%
VMware, Inc. VMware Virtu... 5.00%
MSI MS-7788 5.00%

About (from Check Point, Inc)

Check Point Software Technologies Ltd. (www.checkpoint.
Publisher URL: www.checkpoint.com

commentsComments

user comment
No one has commented yet. Help others learn more about this software, share your comments.