Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How to Remove CA eTrust ITM agent 8.1.637?

Posted on 2013-01-21
7
Medium Priority
?
2,892 Views
Last Modified: 2013-11-22
I'm trying to install Trendmicro Worry Free Client 7.0 on a couple of computers in our office that at one time a while back had CA etrust AV installed on it. I uninstalled the software on the computer manually before installing Trendmicro Client. The Trendmicro client says that the CA eTrust ITM Agent 8.1.637 is still installed and it can't remove it. Now the Trendmicro website says their 7.0 client software can uninstall this product but I guess they are wrong. I found a article on this site that says one user was able to remove all of the CA software and was able to install trendmicro client. Well, I went through that whole motion removing registry entries and I still can't install the trendmicro client because it still says the CA product is still installed. I have been working on this for about 8 hours so far and no luck. I even called CA which claims they sold the product to another company. I called that company and they had no clue on how to uninstall it. So you guys are my last ditch effort. Please Help......
0
Comment
Question by:rraymond1130
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 16

Expert Comment

by:choward16980
ID: 38803422
I had the same issue.  Only way I fixed was with the REVO uninstaller... I hate endorsing products like such, but I was able to remove without purchasing also.
0
 

Author Comment

by:rraymond1130
ID: 38803538
Ok, neither one of those suggestions worked for me..
0
Introducing the WatchGuard 420 Access Point

WatchGuard's newest access point includes an 802.11ac Wave 2 chipset, providing the fastest speeds for VoIP, video and music streaming, and large data file transfers. Additionally, enjoy the benefits of strong security as the 3rd radio delivers dedicated WIPS protection!

 
LVL 16

Expert Comment

by:choward16980
ID: 38811967
I do remember there being an elevated privileges exploit for that exact version of CA.  Wondering if maybe a piece of malware is leveraging/locking the files from being deleted/uninstalled/removed from autorun...  Have you tried using a live boot CD like bit defender to scan and make sure nothing foul is plaguing the machine?
0
 

Author Comment

by:rraymond1130
ID: 38812024
I have scanned this machine with several virus scanners and found nothing. Right now I'm working with Trendmicro to find out what they can find in their logs that their program is choking on.
0
 

Accepted Solution

by:
rraymond1130 earned 0 total points
ID: 38865547
Ok after a couple of weeks working with Trendmicro we finally got rid of 2 registry keys that was keeping the program from being installed. I ran through all of the replies here and none of them helped resolve my problem. Here are the 2 registry keys that kept trendmicro agent from installing:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{54056D16-28C6-4673-BC84-77DA7553EF70}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{107558C8-458B-45EA-A0FE-7CC10D687DB6}
0
 

Author Closing Comment

by:rraymond1130
ID: 38879510
I ran through all of the replies here and none of them helped resolve my problem. Here are the 2 registry keys that kept trendmicro agent from installing:
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to explain how to manually move a SEP client to a different client group by performing steps on the client-side. These steps may prove particularly useful because they allow the client to move after it has alrea…
PREFACE The purpose of this guide is to provide information to successfully add specific IIS 7.0 role services for the Symantec Endpoint Protection Manager (SEPM) to function properly when installed on Windows 2008. AUDIENCE Information Technol…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

704 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question