Managing the Endpoint Security Client 4.0 193novdocx (en) 17 September 2009Preparing a Machine for Client UninstallationBefore uninstalling the Security Client on a machine, you should do the following: Distribute a simple policy to the machine. Policies that globally disable Wi-Fi functionalityalso disable any communication hardware, and storage devices can leave the hardware disabledfollowing uninstallation, requiring you to manually re-enable each device. Eject the wireless card prior to uninstallation, switch off the Wi-Fi radio, and close all softwarewith a network connection (for example, VPN or FTP software).Performing an Attended UninstallTo uninstall the Security Client, do one of the following: Click Start > Programs > Novell > ZENworks Security Client > Uninstall ZENworks SecurityClient. Run the setup.exe program using the following command syntax:setup.exe /V"STUNINSTALL=1" Run Windows Installer using the following command syntax:msiexec.exe /x {6208B443-6136-484A-AF4A-74BEA8A3840E} STUNINSTALL=1To specify the uninstall password when using setup.exe or msiexec.exe, use theSTUIP=password option. For example:setup.exe /V"STUNINSTALL=1 STUIP=removeZESM"Performing an Unattended (Silent) UninstallTo perform a silent uninstall the Security Client, do one of the following: Run the setup.exe program using the following command syntax:setup.exe /s /x /V"/qn STUNINSTALL=1" Run Windows Installer using the following command syntax:msiexec.exe /x /qn {6208B443-6136-484A-AF4A-74BEA8A3840E} STUNINSTALL=1If the Security Client requires an uninstall password, use the STUIP=password option. For example:setup.exe /s /x /V"/qn STUNINSTALL=1 STUIP=removeZESM"8.3 Running the Endpoint Security Client 4.0The Endpoint Security Client 4.0 runs automatically at system startup. For user operation of theEndpoint Security Client, see the ZENworks Endpoint Security Client 4.0 User Guide.You can distribute the guide to all users to help them better understand the operation of their newsecurity software.The following sections contain more information: Section 8.3.1, “Multiple User Support,” on page 194