Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Uninstall Program using GPO

Posted on 2009-05-20
2
Medium Priority
?
466 Views
Last Modified: 2012-05-07
Hello,

I have deployed Windows Defender via GPO a few months back. I now need to have the program uninstalled from the machines it was deployed to. I see an option to uninstall the program when the PC falls out of the scope of managment, but thats not exactly what I want. Any suggestions?
0
Comment
Question by:chuckycharms
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 27

Accepted Solution

by:
bluntTony earned 1000 total points
ID: 24434713
When you remove the package from the GPO, it gives you the option to remove the software from the machines. Select 'Immediately remove the software from users and computers'.


0
 
LVL 4

Author Comment

by:chuckycharms
ID: 24434912
Thank You!
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Here's a look at newsworthy articles and community happenings during the last month.
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question