192 ZENworks Endpoint Security Management Administration Guidenovdocx (en) 17 September 20098.2 Installing and Uninstalling the ZENworksSecurity AgentThe following sections contain more information: Section 8.2.1, “Installing the Endpoint Security Client 4.0,” on page 192 Section 8.2.2, “Uninstalling the Endpoint Security Client 4.0,” on page 1928.2.1 Installing the Endpoint Security Client 4.0Before you begin: Verify that all security patches for Microsoft and anti-virus software are installed and up todate. The Endpoint Security Client 4.0 software can be installed on Windows Vista runningSupport Pack 1 running in 32-bit mode. Novell recommends that antivirus/spyware software that is interacting with valid registryfunctions be shut down during the installation of the Endpoint Security Client 4.0. The Managed Endpoint Security Client requires SSL communication to the ZENworksEndpoint Security Management Service component. If you selected self-signed certificatesduring the Management Service or the Single Server installation, the endpoint running theSecurity Client must have the certificate installed in the proper context (preferably in the localcomputer context).To do this automatically, place the ESM-MS.cer file in the folder along with the EndpointSecurity Client installer’s Setup.exe file. Optionally, you can copy the entire ESM SetupFiles folder from the Management Service installation (or Single Server installation) into thefolder with the Endpoint Security Client installer Setup.exe (ensure that the ESM-MS.cert isin the ESM Setup Files folder and the folder is named ESM Setup Files). Thisautomatically installs the certificate onto the machine (for example, for all users). This processcan also be done with the Novell license.dat file.For installation instructions, see “Endpoint Security Client 3.5 Installation” in the ZENworksEndpoint Security Management Installation Guide.8.2.2 Uninstalling the Endpoint Security Client 4.0The following sections provide instructions for performing an attended uninstall and an unattended(silent) uninstall: “Preparing a Machine for Client Uninstallation” on page 193 “Performing an Attended Uninstall” on page 193 “Performing an Unattended (Silent) Uninstall” on page 193