GlobalProtect
Uninstall the GlobalProtect App for Linux
Table of Contents
Expand All
|
Collapse All
GlobalProtect Docs
-
10.1 & Later
- 10.1 & Later
- 9.1 (EoL)
-
- How Does the App Know Which Certificate to Supply?
-
- Set Up LDAP Authentication
-
- SAML Authentication for GlobalProtect Portals on Non-Standard Ports
- Enforce SAML Authentication from Trusted IP Addresses
- About the Embedded Browser for SAML Authentication
- Use the Default System Browser for SAML Authentication
- Enable Default Browser for SAML Authentication Using Client Authentication Setting
- Customize the SAML/CAS ACS Landing Page
- Set Up Kerberos Authentication
- Set Up RADIUS or TACACS+ Authentication
- Set Up Cloud Identity Engine Authentication
- Configure GlobalProtect to Facilitate Multi-Factor Authentication Notifications
- Enable Delivery of VSAs to a RADIUS Server
- Enable Group Mapping
-
-
- GlobalProtect App Minimum Hardware Requirements
- Download the GlobalProtect App Software Package for Hosting on the Portal
- Host App Updates on the Portal
- Host App Updates on a Web Server
- Test the App Installation
- Download and Install the GlobalProtect Mobile App
- View and Collect GlobalProtect App Logs
-
-
- Deploy App Settings in the Windows Registry
- Deploy App Settings from Msiexec
- Deploy Scripts Using the Windows Registry
- Deploy Scripts Using Msiexec
- Deploy Connect Before Logon Settings in the Windows Registry
- Deploy GlobalProtect Credential Provider Settings in the Windows Registry
- SSO Wrapping for Third-Party Credential Providers on Windows Endpoints
- Enable SSO Wrapping for Third-Party Credentials with the Windows Registry
- Enable SSO Wrapping for Third-Party Credentials with the Windows Installer
- GlobalProtect Processes to be Whitelisted on EDR Deployments
-
-
- Mobile Device Management Overview
- Set Up the MDM Integration With GlobalProtect
- Qualified MDM Vendors
-
-
- Set Up the Microsoft Intune Environment for Android Endpoints
- Deploy the GlobalProtect App on Android Endpoints Using Microsoft Intune
- Create an App Configuration on Android Endpoints Using Microsoft Intune
- Configure Lockdown Mode for Always On Connect Method on Android Endpoints Using Microsoft Intune
-
-
-
- Create a Smart Computer Group for GlobalProtect App Deployment
- Create a Single Configuration Profile for the GlobalProtect App for macOS
- Deploy the GlobalProtect Mobile App for macOS Using Jamf Pro
-
- Enable GlobalProtect System Extensions on macOS Endpoints Using Jamf Pro
- Enable GlobalProtect Network Extensions on macOS Big Sur Endpoints Using Jamf Pro
- Add a Configuration Profile for the GlobalProtect Enforcer by Using Jamf Pro 10.26.0
- Verify Configuration Profiles Deployed by Jamf Pro
- Remove System Extensions on macOS Monterey Endpoints Using Jamf Pro
- Non-Removable System Extensions on macOS Sequoia Endpoints Using Jamf Pro
- Uninstall the GlobalProtect Mobile App Using Jamf Pro
-
-
- Configure HIP-Based Policy Enforcement
- Configure HIP Exceptions for Patch Management
- Collect Application and Process Data From Endpoints
- Redistribute HIP Reports
-
- Identification and Quarantine of Compromised Devices Overview and License Requirements
- View Quarantined Device Information
- Manually Add and Delete Devices From the Quarantine List
- Automatically Quarantine a Device
- Use GlobalProtect and Security Policies to Block Access to Quarantined Devices
- Redistribute Device Quarantine Information from Panorama
- Troubleshoot HIP Issues
-
- Enable Host Compliance Service
- Configure CIE for HCS
-
- Create Host Compliance Object
- Create Host Compliance Profile with Host Compliance Objects
- Enable User-ID
- Apply the Host Compliance Profile to a Security Policy
- Define GlobalProtect Host Compliance Notifications
- Configure Service Route for HCS
- Verify that your Host Compliance Profiles are Working as Expected
- Verifying the Host Compliance Services Details
- Upgrade and Migration
- Downgrade Scenario
- Limitations
-
-
-
- Enable and Verify FIPS-CC Mode on Windows Endpoints
- Enable and Verify FIPS-CC Mode on macOS Endpoints
- Enable and Verify FIPS-CC Mode Using Workspace ONE on iOS Endpoints
- Enable FIPS Mode on Linux EndPoints with Ubuntu or RHEL
- Enable and Verify FIPS-CC Mode Using Microsoft Intune on Android Endpoints
- FIPS-CC Security Functions
- Resolve FIPS-CC Mode Issues
-
-
- Remote Access VPN (Authentication Profile)
- Remote Access VPN (Certificate Profile)
- Remote Access VPN with Two-Factor Authentication
- GlobalProtect Always On VPN Configuration
- Remote Access VPN with Pre-Logon
- User-Initiated Pre-Logon Connection
- GlobalProtect Multiple Gateway Configuration
- GlobalProtect for Internal HIP Checking and User-Based Access
- Mixed Internal and External Gateway Configuration
- Captive Portal and Enforce GlobalProtect for Network Access
- GlobalProtect on Windows 365 Cloud PC
-
- About GlobalProtect Cipher Selection
- Cipher Exchange Between the GlobalProtect App and Gateway
-
- Reference: GlobalProtect App Cryptographic Functions
-
- Reference: TLS Ciphers Supported by GlobalProtect Apps on macOS Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Windows Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Android 6.0.1 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on iOS 10.2.1 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Chromebooks
- Ciphers Used to Set Up IPsec Tunnels
- SSL APIs
-
- View a Graphical Display of GlobalProtect User Activity in PAN-OS
- View All GlobalProtect Logs on a Dedicated Page in PAN-OS
- Event Descriptions for the GlobalProtect Logs in PAN-OS
- Filter GlobalProtect Logs for Gateway Latency in PAN-OS
- Restrict Access to GlobalProtect Logs in PAN-OS
- Forward GlobalProtect Logs to an External Service in PAN-OS
- Configure Custom Reports for GlobalProtect in PAN-OS
-
6.2
- 6.3
- 6.2
- 6.1
- 6.0
- 5.1
-
- Download and Install the GlobalProtect App for Windows
- Use Connect Before Logon
- Use Single Sign-On for Smart Card Authentication
- Use the GlobalProtect App for Windows
- Report an Issue From the GlobalProtect App for Windows
- Disconnect the GlobalProtect App for Windows
- Uninstall the GlobalProtect App for Windows
- Fix a Microsoft Installer Conflict
-
- Download and Install the GlobalProtect App for macOS
- Use the GlobalProtect App for macOS
- Report an Issue From the GlobalProtect App for macOS
- Disconnect the GlobalProtect App for macOS
- Uninstall the GlobalProtect App for macOS
- Remove the GlobalProtect Enforcer Kernel Extension
- Enable the GlobalProtect App for macOS to Use Client Certificates for Authentication
-
- Download and Install the GlobalProtect App for Linux
- Use the GlobalProtect App for Linux
- Report an Issue From the GlobalProtect App for Linux
- Disconnect the GlobalProtect App for Linux
- Uninstall the GlobalProtect App for Linux
- Support for Native Certificate Store for Prisma Access and GlobalProtect App
-
6.1
- 6.1
- 6.0
- 5.1
-
6.3
- 6.3
- 6.2
- 6.1
- 6.0
- 5.1
- Features Introduced
- Changes to Default Behavior
- Associated Software and Content Versions
-
- GlobalProtect 6.3.3 Linux Known Issues
- GlobalProtect 6.3.3-h3 (6.3.3-c711) Windows and macOS Known Issues
- GlobalProtect 6.3.3-h2 (6.3.3-676) Windows and macOS Known Issues
- GlobalProtect 6.3.3-h1 (6.3.3-c650) Windows and macOS Known Issues
- GlobalProtect 6.3.3 Known Issues
- GlobalProtect 6.3.2 Known Issues
- GlobalProtect 6.3.1 Known Issues
- GlobalProtect 6.3.0 Known Issues
-
- GlobalProtect 6.3.3 Linux Addressed Issues
- GlobalProtect 6.3.3-h3 (6.3.3-c711) Windows and macOS Addressed Issues
- GlobalProtect 6.3.3-h2 (6.3.3-c676) Windows and macOS Addressed Issues
- GlobalProtect 6.3.3-h1 (6.3.3-c650) Windows and macOS Addressed Issues
- GlobalProtect 6.3.3 Addressed Issues
- GlobalProtect 6.3.2 Addressed Issues
- GlobalProtect 6.3.1-c383 Addressed Issues
- GlobalProtect 6.3.1 Addressed Issues
- GlobalProtect 6.3.0 Addressed Issues
Uninstall the GlobalProtect App for Linux
You can uninstall the GlobalProtect app for Linux using the following command:
$ ./gp_uninstall.sh --help Usage: $ sudo ./gp_uninstall [--cli-only | --arm | --help] --cli-only: CLI Only --arm: ARM no options: UI
The following packages are not removed during the uninstall:
- Qt Packages
- resolvconf (Ubuntu only)
- Gnome Shell Extension Packages
- Ubuntu 20
- gnome-tweak-tool
- gnome-shell-extension-top-icons-plus
- Ubuntu 22
- gnome-shell-extension-manager
- gnome-shell-extension-appindicator
- RHEL 8
- gnome-tweaks
- gnome-shell-extension-topicons-plus
- RHEL 9
- gnome-shell-extension-top-icons
- Ubuntu 20
You can delete the Ubuntu packages using the $ sudo apt autoremove
command and RHEL packages with the $ sudo yum autoremove command.
When you use either of these commands, the Qt Packages are deleted as well.