TrendMicro uninstall

Posted on 2011-05-10
Last Modified: 2012-05-11
I have a client who lost their TrendMicro password to uninstall the software.  How can I go around this?  Also, what is the default password to uninstall this software as well?

Question by:ee4itpro
    LVL 3

    Expert Comment

    One solution is a registry hack


    take a look at that key you will see one called UseVPUninstallPassword .. w/ a value of 1. change that to a 0 and try uninstalling. should work.
    Here is another registry hack

    another would be possibly found at this link:
    LVL 3

    Expert Comment

    Not sure what iteration of TM you are using but there is a way to reset the PW:

    I also use a tool sometimes for hard to remove Software called JV 16 power tools. It is very powerful and should only be deployed by advanced users. it can be found here

    LVL 23

    Expert Comment

    You could also try AppRemover:

    "...The free AppRemover utility enables the thorough uninstallation of security applications like antivirus and antispyware from your computer..."  

    I have used this utility several times with success.
    LVL 4

    Accepted Solution

    What version of Trend Micro AV are you using? If it's the managed client version in WFBS (Worry-Free Business Security) Use this step by step.
    Solution ID: EN-1056867
    LVL 29

    Expert Comment

    by:Sudeep Sharma
    Below is one more application remover for AVG, this from Sun Belt Software who have created Viper and GFI.


    As per the above link it could remove the following:
    AntiVirus version 7
    OfficeScan 8.0 & 10.0 agents.
    Also removes the following, if installed: Trend PatchInstaller, Trend Threat Management Agent, Trend Cisco Trust Agent, Trend Cisco Trust 802_1x Wired Agent

    I hope that would help


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
    Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now