Solved

Remove SSRPM reset Wizard

Posted on 2011-02-14
3
939 Views
Last Modified: 2012-05-11
Hello folks, I have a customer that left his job and the company allowed him to keep the laptop he had. Well i got the legal notice removed at login, but the only thing left to make it worthwhile is the SSRPM, I would like that removed from this system and I cannot seem to figure out how to do so. The customer does not want anythign from the company left on his system so removal of this is needed.(the company set this up). Help would be nice. Thank you in advance.
0
Comment
Question by:kalkaskageek
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 7

Accepted Solution

by:
Chris Patterson earned 500 total points
ID: 34890747
This is basically a three step process:
1.  Uninstall the SSRPM User Client Software.
2.  Uninstall the SSRPM Service: start the SSRPM Admin Console and use the SSRPM Service Installation Wizard to remove the current SSRPM Service.
3.  Uninstall the SSRPM Admin Console: uninstall the SSRPM Admin Console by running the SSRPM setup executable (called: 'SetupSSRPM.exe') or by using the Windows 'Add or Remove programs' tool.
0
 

Author Comment

by:kalkaskageek
ID: 34891119
I cannot believe i over looked that in AD/Remove programs.... Thank you so much....Happy valintines day. Ty very much <3
0
 

Author Closing Comment

by:kalkaskageek
ID: 34891138
Perfection
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question