Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Removing SSH Tectia Remotely via SSH Tectia Manager

SSH Tectia Manager can be used to uninstall supported SSH Tectia (and SSH Secure Shell) software remotely.

On Windows, the relevant installation packages must be available on the Management Server (required by the Windows uninstallation program).

To remove SSH Tectia software via SSH Tectia Manager:

  1. Select the SSH Tectia product you wish to remove from the Software view: SSH Tectia Client, SSH Tectia ConnectSecure, SSH Tectia Server, or SSH Tectia Connector.

  2. Click the Uninstall button.

  3. Select the Host group from which you wish to remove the SSH Tectia software and click Uninstall.


    SSH Tectia Connector requires restarting to complete the uninstallation. Likewise, when the FTP-SFTP conversion or transparent TCP tunneling components are installed with SSH Tectia Client with EFT Expansion Pack or SSH Tectia ConnectSecure, restarting is required. When uninstalling an SSH Tectia Server on Windows, restarting the host is strongly recommended.

    If a Windows host is not restarted during the uninstallation of these SSH Tectia software, an install lock is set by the Management Agent, preventing any further SSH Tectia installations or uninstallations until the host has been restarted.

    When uninstalling SSH Tectia Server on Windows, if any SSH Tectia Server processes are running on the host, a dialog is presented to the users of the console of the host machine, requesting that they shut down all SSH Tectia Server processes within 3 minutes. After 3 minutes, the Management Agent closes any open connections to the SSH Tectia Server and shuts down the service to continue with the uninstallation.

  4. You are shown a warning message and the list of hosts which belong to the selected group. Click Yes to confirm the uninstallation.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more