How to Uninstall Trend Micro

by Tara Kimball
If your McAfee program is not to your liking, request a refund within 30 days.

If your McAfee program is not to your liking, request a refund within 30 days.

Trend Micro applications include an uninstall utility to remove the software from your computer. If you have been using Trend Micro’s security or anti-virus applications and now want to uninstall the program from your hard drive, it can be done quickly and easily through the uninstall utility. The process requires exploring your Programs directory, so a little bit of comfort with navigating through the system folders of your computer can be helpful, though it is not necessary.

1

Exit any running Trend Micro applications prior to beginning the uninstall process. This ensures that all of the associated files are free of use and accessible to be removed.

2

Open your computer’s Start menu. Click the “Start” button located in the bottom left corner of your Windows task bar. Locate and click on the “My Computer” menu option in the Start menu.

3

Click the “C:” in your My Computer menu. Double-click the “Program Files” folder. Locate the folder labeled “Trend Micro” in your Program Files directory and double-click it.

4

Locate and double-click the icon labeled “Internet Security” within your Trend Micro directory. Locate the “TISSuprt.exe” file in the Internet Security folder. Double-click the file to execute it.

5

Locate the “Uninstall” tab within the Trend Micro Diagnostic Toolkit window. Click the Uninstall tab and click the Uninstall button. Click the Uninstall button a second time when the dialog box appears, asking you to confirm your selection.

6

Click “Yes” to restart your computer when the uninstall process is complete. A dialog box will appear to notify you when the process completes, and will ask you to reboot your computer at that time.

About the Author

Tara Kimball is a former accounting professional with more than 10 years of experience in corporate finance and small business accounting. She has also worked in desktop support and network management. Her articles have appeared in various online publications.

Photo Credits

  • photo_camera Jupiterimages/Pixland/Getty Images