Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Anti-Virus Solution » How to remove Norton from Mac using the RemoveNortonMacFiles tool
  • Hadoop installation
    How to Install Hadoop on Linux Network | Monitoring
  • Copilot Microsoft
    How to Disable Copilot in Windows and Microsoft Edge Windows
  • LDPAs
    Fix LDAP Connection Error 81: Cannot open connection via the ldp.exe tool Windows
  • image 12
    How to Use Postman with the Amazon Pinpoint API AWS/Azure/OpenShift
  • banner 1
    How to Create Shared Folder in Windows Sandbox Virtualization
  • WebLaps
    Configure WebLAPS to manage Microsoft LAPS Windows
  • MAP virtual disk error
    Install Workstation Pro 17: Fix failed to initialise library for mounting and unmounting virtual disks Virtualization
  • Featured image 1
    How to Change User Account Type in Windows 10 Windows

How to remove Norton from Mac using the RemoveNortonMacFiles tool

Posted on 05/11/202305/11/2023 Christian By Christian No Comments on How to remove Norton from Mac using the RemoveNortonMacFiles tool
How to Completely Uninstall Norton Security

In this article, we shall discuss how to remove Norton from Mac using the RemoveNortonMacFiles tool. To remove all Norton programs completely from your Mac thereby avoiding manual deletion of files or via third-party uninstallers without leaving remnants behind that could cause other issues. Please see how to verify whether the xp_cmdshell feature is enabled or disabled in MSSQL Server, How to fix Can’t connect via RDP upon installing Norton 360, and how to Enable or disable Norton silent mode on Mac.

To completely remove all Norton application files and references on your Mac, download and run the RemoveNortonMacFiles tool.

Before running the RemoveNortonMacFiles tool, make sure that you have uninstalled the Norton device security product on your Mac

Step 1: Uninstall Norton from Mac

Kindly follow the steps below to remove Norton 30 from my Mac device. On your Mac PC, click the Finder icon in the dock, and then click Applications in the left pane under the Favorites section as shown below.

Remove-all-Norton-programs-for-Mac

Find the Norton application icon, and drag it to the Trash or Bin. Then, click Continue. If prompted, type your administrator account password, and then click OK.

At this time, I have decided not to remove Norton from my Device. Therefore, not all steps are shown.

Please, see how to Download and install Norton 360 Anti-Virus on your Mac device, and how to fix repeated app-blocking connection alerts from Norton on Mac.

Step 2: Download RemoveNortonMacFiles

The RemoveNortonMacFiles tool removes all the folders that Norton installers created, and all the files within those folders including any that you have created. Please use the Download link “RemoveNortonMacFiles.zip“.

Upon download, click on the download icon as shown below.  By the way, Google Chrome recently added the downloads icon to the toolbar. This experience and UI are similar to the new Microsoft Edge and Firefox.

RemoveNortonMacFiles

Alternatively, click the Finder icon in the Dock. In the Finder window, click Downloads in the left pane under Favorites and locate the downloaded file.

If you downloaded the file using the Mozilla Firefox or Google Chrome browser. Double-click the RemoveNortonMacFiles.zip file as shown below to expand it. Next, open the RemoveNortonMacFiles folder.

Expand RemoveNortonMacFiles.zip file

You can launch the terminal and browser to the expanded file as shown below

 /Users/christian/Desktop/RemoveNortonMacFiles/RemoveNortonMacFiles
Launch the Terminal on Mac

Alternatively, from the RemoveNortonMacFiles folder. Next, right-click the RemoveNortonMacFiles.command file and then select Open with > Terminal (default).

Run the Norton Removal tool

To run this tool, you must be logged on with an Administrator account and a non-blank password.

Open with the terminal

because macOS cannot verify the developer, you will be prompted to select open. Kindly pay attention to the security warning too … In my case, I trust the file, therefore, I will click on “Open”.

open RemoveNortonMacFiles on mac

Click on OK to allow Terminal access to your Desktop folder

Allow Terminal Access to files

When this is done, the following window will be prompted. This is because, I do not want to uninstall Norton and as such, I have not removed the application.

ATTENTION: To uninstall you must drag the following from the
           "/Applications" folder to the trash:

The Application folder will be opened automatically in order for you to remove the Norton Antivirus tool from your PC. You can follow the steps to remove it.

result of command

Also, see how to Scan Apple Calendar: Prevent Norton from scanning your Apple Calendar on iOS, Fix “a network-related or instance-specific error occurred while establishing a connection to SQL Server [Part 2], and how to Enable High Dynamic Range on Windows 11.

FAQs relating to removing Norton Antivirus from your Device

Is it necessary to use the Norton Removal Tool?

While you can uninstall Norton Antivirus using the built-in uninstaller in the Windows Control Panel or Mac’s Applications folder. It is recommended to use the Norton Removal Tool provided by Norton. This tool ensures a more thorough and complete removal which can be important for a clean uninstallation and to prevent any remnants of the antivirus program from affecting your system.

What should I do after removing Norton Antivirus from my device?

Restart your PC to ensure residual components are removed. Install an alternative antivirus or security software if you wish to maintain protection on your PC.

I hope you found this blog post helpful on how to remove Norton from Mac using the RemoveNortonMacFiles tool. Please let me know in the comment section if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Anti-Virus Solution, Security | Vulnerability Scans and Assessment Tags:macOS Monterey, macOS Ventura, Norton, Norton 360, Norton 360 Advanced Anti-Virus

Post navigation

Previous Post: How to verify whether the xp_cmdshell feature is enabled or disabled in MSSQL Server
Next Post: How to set up Norton Cloud Backup on Windows

Related Posts

  • Mimikatz hacktool Trillix
    Windows Defender detects Endpoint Security HipHandlers.dll Security | Vulnerability Scans and Assessment
  • ePO installation on Windows Server
    Trellix ePolicy Orchestrator Installation on Windows Server Security | Vulnerability Scans and Assessment
  • MBAM noncompliance
    How to determine why an MBAM-protected device is non-compliant Security | Vulnerability Scans and Assessment
  • Feature image 1
    Configure and validate Exclusions for Microsoft Defender Antivirus scans Anti-Virus Solution
  • burp20
    Install and use Burp Suite for Web Application Security Testing Security | Vulnerability Scans and Assessment
  • encryption 04.05.32
    How to Enable BitLocker without Compatible TPM Security | Vulnerability Scans and Assessment

More Related Articles

Mimikatz hacktool Trillix Windows Defender detects Endpoint Security HipHandlers.dll Security | Vulnerability Scans and Assessment
ePO installation on Windows Server Trellix ePolicy Orchestrator Installation on Windows Server Security | Vulnerability Scans and Assessment
MBAM noncompliance How to determine why an MBAM-protected device is non-compliant Security | Vulnerability Scans and Assessment
Feature image 1 Configure and validate Exclusions for Microsoft Defender Antivirus scans Anti-Virus Solution
burp20 Install and use Burp Suite for Web Application Security Testing Security | Vulnerability Scans and Assessment
encryption 04.05.32 How to Enable BitLocker without Compatible TPM Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Hadoop installation
    How to Install Hadoop on Linux Network | Monitoring
  • Copilot Microsoft
    How to Disable Copilot in Windows and Microsoft Edge Windows
  • LDPAs
    Fix LDAP Connection Error 81: Cannot open connection via the ldp.exe tool Windows
  • image 12
    How to Use Postman with the Amazon Pinpoint API AWS/Azure/OpenShift
  • banner 1
    How to Create Shared Folder in Windows Sandbox Virtualization
  • WebLaps
    Configure WebLAPS to manage Microsoft LAPS Windows
  • MAP virtual disk error
    Install Workstation Pro 17: Fix failed to initialise library for mounting and unmounting virtual disks Virtualization
  • Featured image 1
    How to Change User Account Type in Windows 10 Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.