web
You’re offline. This is a read only version of the page.
close

Online Help Center

  • Search
  • Support
    • For Home
    • For Business
  • English (US)
    • Bahasa Indonesia (Indonesian)
    • Dansk (Danish)
    • Deutsch (German)
    • English (Australia)
    • English (US)
    • Español (Spanish)
    • Français (French)
    • Français Canadien
      (Canadian French)
    • Italiano (Italian)
    • Nederlands (Dutch)
    • Norsk (Norwegian)
    • Polski (Polish)
    • Português - Brasil
      (Portuguese - Brazil)
    • Português - Portugal
      (Portuguese - Portugal)
    • Svenska (Swedish)
    • ภาษาไทย (Thai)
    • Tiếng Việt (Vietnamese)
    • Türkçe (Turkish)
    • Čeština (Czech)
    • Ελληνικά (Greek)
    • Български (Bulgarian)
    • Русский (Russian)
    • עברית (Hebrew)
    • اللغة العربية (Arabic)
    • 日本語 (Japanese)
    • 简体中文
      (Simplified Chinese)
    • 繁體中文
      (Traditional Chinese)
    • 繁體中文 HK
      (Traditional Chinese)
    • 한국어 (Korean)
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
  • Preface
    • IM Security Documentation
    • Audience
    • Document Conventions
  • Introducing Trend Micro IM Security
    • IM Security Overview
    • Features and Benefits
    • File and Instant Messaging Protection
      • Communication Control
      • Virus Scan
      • File Blocking
      • Content Filtering
      • Web Reputation
      • Data Loss Prevention
      • Reports and Logs
      • Alerts and Notifications
    • Protection Strategy
    • IM Security and Lync/Skype for Business Server Deployment Scenarios
      • Standard Edition Configuration
      • Enterprise Edition: Consolidated Configuration
      • Enterprise Edition: Expanded Configuration
  • Pre-Installation Tasks
    • Planning for Deployment
      • Phase 1: Plan the Deployment
      • Phase 2: Install IM Security
      • Phase 3: Manage IM Security
    • Deployment Considerations
    • Conducting a Pilot Deployment
      • Choosing a Pilot Site
      • Creating a Contingency Plan
      • Deploying and Evaluating a Pilot Deployment
    • Redefining the Deployment Strategy
    • System Requirements
    • Pre-Installation Tasks
  • Installing and Upgrading IM Security
    • Installing IM Security
    • Upgrading IM Security
  • Silent Installation
    • About Silent Installation
      • Silent Installation Limitations
    • Performing Silent Installation
      • Using an Existing Pre-Configured File
  • Post-Installation Tasks
    • Verify Server Changes
    • Prepare Other Antivirus Applications
    • About the IM Security Management Pack
    • Verifying a Successful Installation
    • Checking Default Settings
    • About IM Security Updates
      • Updating IM Security - Prerequisite Tasks
      • Configuring Proxy Settings
      • Configuring Manual Updates
      • Configuring Scheduled Update
      • Configuring the Download Source
  • Removing IM Security
    • IM Security Uninstallation
    • Using the Enterprise Solution DVD
    • Using the Windows Control Panel
  • Technical Support
    • Troubleshooting Resources
      • Using the Support Portal
      • Threat Encyclopedia
    • Contacting Trend Micro
      • Speeding Up the Support Call
    • Sending Suspicious Content to Trend Micro
      • Email Reputation Services
      • File Reputation Services
      • Web Reputation Services
    • Other Resources
      • Download Center
      • Documentation Feedback
  • Deployment Checklist
    • Pre-Installation Tasks Checklist
    • Installation Checklist
    • Ports Checklist
  • Glossary
Removing IM Security
This chapter describes how to remove IM Security.
Topics in this chapter:
  • IM Security Uninstallation
  • Using the Enterprise Solution DVD
  • Using the Windows Control Panel
Related information
  • IM Security Uninstallation
  • Using the Enterprise Solution DVD
  • Using the Windows Control Panel
Was this article helpful?

Please share more details.

Please share more details.

Please share more details.

Please share more details.

Online Help Center

Support
For Home For Business


Privacy Notice
© 2025 Trend Micro Incorporated. All rights reserved.
Table of Contents
  • Preface
    • IM Security Documentation
    • Audience
    • Document Conventions
  • Introducing Trend Micro IM Security
    • IM Security Overview
    • Features and Benefits
    • File and Instant Messaging Protection
      • Communication Control
      • Virus Scan
      • File Blocking
      • Content Filtering
      • Web Reputation
      • Data Loss Prevention
      • Reports and Logs
      • Alerts and Notifications
    • Protection Strategy
    • IM Security and Lync/Skype for Business Server Deployment Scenarios
      • Standard Edition Configuration
      • Enterprise Edition: Consolidated Configuration
      • Enterprise Edition: Expanded Configuration
  • Pre-Installation Tasks
    • Planning for Deployment
      • Phase 1: Plan the Deployment
      • Phase 2: Install IM Security
      • Phase 3: Manage IM Security
    • Deployment Considerations
    • Conducting a Pilot Deployment
      • Choosing a Pilot Site
      • Creating a Contingency Plan
      • Deploying and Evaluating a Pilot Deployment
    • Redefining the Deployment Strategy
    • System Requirements
    • Pre-Installation Tasks
  • Installing and Upgrading IM Security
    • Installing IM Security
    • Upgrading IM Security
  • Silent Installation
    • About Silent Installation
      • Silent Installation Limitations
    • Performing Silent Installation
      • Using an Existing Pre-Configured File
  • Post-Installation Tasks
    • Verify Server Changes
    • Prepare Other Antivirus Applications
    • About the IM Security Management Pack
    • Verifying a Successful Installation
    • Checking Default Settings
    • About IM Security Updates
      • Updating IM Security - Prerequisite Tasks
      • Configuring Proxy Settings
      • Configuring Manual Updates
      • Configuring Scheduled Update
      • Configuring the Download Source
  • Removing IM Security
    • IM Security Uninstallation
    • Using the Enterprise Solution DVD
    • Using the Windows Control Panel
  • Technical Support
    • Troubleshooting Resources
      • Using the Support Portal
      • Threat Encyclopedia
    • Contacting Trend Micro
      • Speeding Up the Support Call
    • Sending Suspicious Content to Trend Micro
      • Email Reputation Services
      • File Reputation Services
      • Web Reputation Services
    • Other Resources
      • Download Center
      • Documentation Feedback
  • Deployment Checklist
    • Pre-Installation Tasks Checklist
    • Installation Checklist
    • Ports Checklist
  • Glossary
Close