{"id":1494,"date":"2021-06-11T14:58:11","date_gmt":"2021-06-11T18:58:11","guid":{"rendered":"https:\/\/inside.wooster.edu\/technology-documentation\/?page_id=1494"},"modified":"2022-08-31T07:19:51","modified_gmt":"2022-08-31T11:19:51","slug":"removing-vpn-from-your-mac","status":"publish","type":"epkb_post_type_1","link":"https:\/\/inside.wooster.edu\/technology\/knowledge-base\/removing-vpn-from-your-mac\/","title":{"rendered":"Removing VPN From your Mac"},"content":{"rendered":"\n\t\t<div id=\"eckb-article-page-container-v2\" class=\"eckb-article-page-content-counter eckb_ap_active_theme_twentytwentytwo \" data-mobile_breakpoint=\"768\">    \t\t\t\t<a href=\"#eckb-article-content\" class=\"eckb-skip-link eckb-screen-reader-text\">Skip to main content<\/a>   <div id=\"eckb-article-header\" >\n\t\t<div id=\"epkb-ml__module-search\" class=\"epkb-ml__module \">   \n\t\t\t<!-- Classic Search Layout -->\n\t\t\t<div id=\"epkb-ml-search-classic-layout\">    \t\t<h2 class=\"epkb-ml-search-title\">What can we help you with?<\/h2>   \t\t\t\t<form id=\"epkb-ml-search-form\" class=\"epkb-ml-search-input-height--medium\" method=\"get\" onsubmit=\"return false;\" data-collection-id=\"1\" data-collection-token=\"47b91bfe7e\">\n\t\t\t\t<input type=\"hidden\" id=\"epkb_kb_id\" value=\"1\" >\n\n\t\t\t\t<!-- Search Input Box -->\n\t\t\t\t<div id=\"epkb-ml-search-box\">\n\t\t\t\t\t<input class=\"epkb-ml-search-box__input\" type=\"text\" name=\"s\" value=\"\" aria-label=\"Search the documentation...\"\n\t\t\t\t\t        placeholder=\"Search the documentation...\" aria-controls=\"epkb-ml-search-results\" >\n\t\t\t\t\t<button class=\"epkb-ml-search-box__btn\" type=\"submit\">\n                        <span class=\"epkb-ml-search-box__text\"> Search<\/span>\n                        <span class=\"epkbfa epkbfa-spinner epkbfa-ml-loading-icon\"><\/span>\n                    <\/button>\n\t\t\t\t<\/div>\n\n\t\t\t\t<!-- Search Results -->\n\t\t\t\t<div id=\"epkb-ml-search-results\" aria-live=\"polite\"><\/div>\n\t\t\t<\/form>\n\t\t<\/div>  \n\t\t<\/div>  <\/div>\n\t\t\t<div id=\"eckb-article-body\">  <div id=\"eckb-article-left-sidebar\" ><\/div>\n\t\t        <article id=\"eckb-article-content\" tabindex=\"-1\" data-article-id=\"1494\" >                        <div id=\"eckb-article-content-header-v2\" ><div id=\"eckb-article-content-header-row-1\"><div class=\"eckb-article-content-header-row-left-group\"><div id=\"eckb-article-back-navigation-container\"><div class=\"eckb-navigation-back  \"  style=\"margin-top: 4px; margin-right: 15px; margin-bottom: 4px; margin-left: 4px;\" ><div tabindex=\"0\" class=\"eckb-navigation-button\"  style=\"padding-top: 5px; padding-right: 10px; padding-bottom: 5px; padding-left: 10px; color: #1e73be; background-color: #ffffff; font-size:14px;border-radius: 3px; border-style: solid; border-width: 1px; border-color: #b5b5b5;\"  onclick=\"history.go(-1);\" >&lt; All Topics<\/div><\/div><\/div><div id=\"eckb-article-content-breadcrumb-container\">\n\t<div class=\"eckb-breadcrumb\"  style=\"padding-top: 0px; padding-right: 4px; padding-bottom: 0px; padding-left: 4px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font-size:14px;\" >    \t\t<nav class=\"eckb-breadcrumb-outline\" aria-label=\"Breadcrumb\">\n\t\t\t<ul class=\"eckb-breadcrumb-nav\">       <li  style=\"font-size:14px;\" >\t<span class=\"eckb-breadcrumb-link\"><a tabindex=\"0\" href=\"https:\/\/inside.wooster.edu\/technology\/knowledge-base\/\"><span  style=\"color: #1e73be;\"  >Main<\/span><\/a><span class=\"eckb-breadcrumb-link-icon ep_font_icon_arrow_carrot_right\" aria-hidden=\"true\"><\/span>\t<\/span><\/li><li  style=\"font-size:14px;\" >\t<span class=\"eckb-breadcrumb-link\"><a tabindex=\"0\" href=\"https:\/\/inside.wooster.edu\/technology\/knowledge-base\/category\/network\/\"><span  style=\"color: #1e73be;\"  >Network, Cybersecurity, and Best Practices<\/span><\/a><span class=\"eckb-breadcrumb-link-icon ep_font_icon_arrow_carrot_right\" aria-hidden=\"true\"><\/span>\t<\/span><\/li><li  style=\"font-size:14px;\" >\t<span class=\"eckb-breadcrumb-link\"><span aria-current=\"page\" style=\"color: #1e73be;\"  >Removing VPN From your Mac<\/span>\t<\/span><\/li>\t\t\t<\/ul>\n\t\t<\/nav>\n\n\t<\/div>          <\/div><\/div><div class=\"eckb-article-content-header-row-right-group\"><div id=\"eckb-article-content-toolbar-container\">\n\t\t<div class=\"eckb-article-content-toolbar-button-container\">\n\t\t\t<span class=\"eckb-print-button-container\" tabindex=\"0\" role=\"button\" aria-label=\"Print\">\t\t\t<span class=\"eckb-toolbar-button-text\">Print<\/span><span class=\"eckb-toolbar-button-icon epkbfa epkbfa-print\"><\/span>\t\t\t<\/span>\n\t\t<\/div> <\/div><\/div><\/div><div id=\"eckb-article-content-header-row-2\"><div class=\"eckb-article-content-header-row-left-group\"><div id=\"eckb-article-content-title-container\"><h1 class=\"eckb-article-title\">Removing VPN From your Mac<\/h1><\/div><\/div><\/div><div id=\"eckb-article-content-header-row-3\"><div class=\"eckb-article-content-header-row-left-group\">\n\t\t<div class=\"eckb-article-content-last-updated-date-container\">\t\t<span class=\"eckb-meta-data-feature-icon epkbfa epkbfa-pencil-square-o\"><\/span><span class=\"eckb-meta-data-feature-text\">Updated<\/span><span class=\"eckb-meta-data-feature-value\"><time datetime=\"2022-08-31T07:19:51-04:00\">August 31, 2022<\/time><\/span>\t\t<\/div> <\/div><\/div><\/div><div id=\"eckb-article-content-body\" ><h3 class=\"wp-block-heading\" id=\"to-uninstall-globalprotect-vpn-from-your-mac-follow-these-steps\">To uninstall GlobalProtect VPN from your Mac follow these steps:<\/h3>\n\n\n<p>1.Launch a web browser and enter the following URL: <a href=\"http:\/\/vpn.wooster.edu\">vpn.wooster.edu<\/a><\/p>\n\n\n\n<p>2. On the GlobalProtect portal page you will login with your username and password.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"555\" height=\"488\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/Paloalto.png\" alt=\"\" class=\"wp-image-1495\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/Paloalto.png 555w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/Paloalto-300x264.png 300w\" sizes=\"auto, (max-width: 555px) 100vw, 555px\" \/><figcaption>GlobalProtect Login Portal<\/figcaption><\/figure>\n\n\n\n<p>3. Once logged in the download page will open, select Download Mac 32\/64 bit GlobalProtect agent.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"544\" height=\"632\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-1.png\" alt=\"\" class=\"wp-image-1497\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-1.png 544w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-1-258x300.png 258w\" sizes=\"auto, (max-width: 544px) 100vw, 544px\" \/><figcaption>Paloalto Download Menu<\/figcaption><\/figure>\n\n\n\n<p>4. <strong>Run<\/strong> the software<\/p>\n\n\n\n<p>5. <strong>Run<\/strong> the GlobalProtect Installer<\/p>\n\n\n\n<p>6. Once the installer launches, select <strong>continue<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"618\" height=\"434\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-1-1.png\" alt=\"\" class=\"wp-image-1498\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-1-1.png 618w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-1-1-300x211.png 300w\" sizes=\"auto, (max-width: 618px) 100vw, 618px\" \/><figcaption>GlobalProtect Installer<\/figcaption><\/figure>\n\n\n\n<p>7. On the <strong>Destination Select<\/strong> window, select <strong>continue<\/strong>.<\/p>\n\n\n\n<p>8. On the <strong>Installation Type<\/strong> wondow, select the <strong>Uninstall GlobalProtect <\/strong>package, and then select <strong>Continue<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"618\" height=\"435\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-2.png\" alt=\"\" class=\"wp-image-1499\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-2.png 618w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-2-300x211.png 300w\" sizes=\"auto, (max-width: 618px) 100vw, 618px\" \/><figcaption>GlobalProtect Installation Type Window<\/figcaption><\/figure>\n\n\n\n<p>9. Select <strong>Install<\/strong> to confirm that you would like to uninstall the application.<\/p>\n\n\n\n<p>10. A new window will launch asking for your <strong>Username <\/strong>and <strong>Password<\/strong>. This will be the username and password for your device <strong>NOT<\/strong> your College of Wooster Credentials.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"617\" height=\"436\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-3.png\" alt=\"\" class=\"wp-image-1500\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-3.png 617w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/06\/original-3-300x212.png 300w\" sizes=\"auto, (max-width: 617px) 100vw, 617px\" \/><figcaption>GlobalProtect Installer asking for your computers Username and Password<\/figcaption><\/figure>\n\n\n\n<p>Select <strong>Install Software<\/strong><\/p>\n\n\n\n<p>11. A window will now open saying you have successfully uninstalled GlobalProtect<\/p>\n<\/div><div id=\"eckb-article-content-footer\" >\n\t\t<div class=\"epkb-article-navigation-container \">            \t\t\t\t<div class=\"epkb-article-navigation__previous\"> <a href=\"https:\/\/inside.wooster.edu\/technology\/knowledge-base\/protecting-your-personal-network\/?seq_no=2\" rel=\"prev\">\n\t\t\t\t\t<span class=\"epkb-article-navigation__label\">\n\t\t\t\t\t    <span class=\"epkb-article-navigation__label__previous__icon epkbfa epkbfa-caret-left\"><\/span>\n\t\t\t\t\t    Previous\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<span title=\"Protecting your Personal Network\" class=\"epkb-article-navigation-article__title\">\n\t\t\t\t\t\t<span class=\"epkb-article-navigation__previous__icon epkbfa ep_font_icon_document\"><\/span>\n\t\t\t\t\t\tProtecting your Personal Network\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/a>\t\t\t\t<\/div>  \t\t\t\t<div class=\"epkb-article-navigation__next\"><a href=\"https:\/\/inside.wooster.edu\/technology\/knowledge-base\/securing-portable-mobile-devices\/\" rel=\"next\">\n\t\t\t\t\t<span class=\"epkb-article-navigation__label\">\n\t\t\t\t\t    Next\n\t\t\t\t\t    <span class=\"epkb-article-navigation__label__next__icon epkbfa epkbfa-caret-right\"><\/span>\n                    <\/span>\n\t\t\t\t\t<span title=\"Securing Portable and Mobile Devices\" class=\"epkb-article-navigation-article__title\">\n\t\t\t\t\t\tSecuring Portable and Mobile Devices\n\t\t\t\t\t\t<span class=\"epkb-article-navigation__next__icon epkbfa ep_font_icon_document\"><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/a>\n\t\t\t   \t\t\t\t<\/div>  \n\t\t<\/div>        <\/div>\n\t\t        <\/article><!-- \/#eckb-article-content -->     <div id=\"eckb-article-right-sidebar\" >\n\t\t\t<div class=\"eckb-article-toc  eckb-article-toc--bmode-between eckb-article-toc-reset \"\t\t\t\t\n\t\t\t\tdata-offset=\"130\"\n\t\t\t\tdata-min=\"2\"\n\t\t\t\tdata-max=\"6\"\n\t\t\t\tdata-speed=\"300\"\n\t\t\t\tdata-exclude_class=\"\"\n\t\t\t\t><div class=\"eckb-article-toc__title\">Table of Contents<\/div><\/div>\n\t\t\t<\/div>\n\t\t\t<\/div><!-- \/#eckb-article-body -->              <div id=\"eckb-article-footer\" ><\/div>\n\t\t<\/div><!-- \/#eckb-article-page-container-v2 -->\n\n\t\t<style id=\"eckb-article-styles\" type=\"text\/css\">@media only screen and (min-width:768px){#eckb-article-page-container-v2 #eckb-article-body #eckb-article-content #eckb-article-content-header-v2 #eckb-article-content-header-row-1,#eckb-article-page-container-v2 #eckb-article-body #eckb-article-content #eckb-article-content-header-v2 #eckb-article-content-header-row-2,#eckb-article-page-container-v2 #eckb-article-body #eckb-article-content #eckb-article-content-header-v2 #eckb-article-content-header-row-3,#eckb-article-page-container-v2 #eckb-article-body #eckb-article-content #eckb-article-content-header-v2 #eckb-article-content-header-row-4,#eckb-article-page-container-v2 #eckb-article-body #eckb-article-content #eckb-article-content-header-v2 #eckb-article-content-header-row-5{flex-direction:row;}}#eckb-article-content-header-row-1{margin-bottom:8px;}#eckb-article-content-header-row-1 .eckb-article-content-header-row-left-group,#eckb-article-content-header-row-1 .eckb-article-content-header-row-right-group{align-items:center;}.eckb-article-content-toolbar-button-container{background-color:#ffffff;padding:10px 10px 10px 10px;margin:0px 0px 0px 0px;border-radius:0px;border-width:0px;border-color:#ffffff;border-style:solid;}.eckb-article-content-toolbar-button-container .eckb-toolbar-button-text{color:#000000;font-size:15px;}.eckb-article-content-toolbar-button-container .eckb-toolbar-button-icon{color:#000000;font-size:20px;}.eckb-article-content-toolbar-button-container:hover{background-color:#ffffff;}.eckb-article-content-toolbar-button-container:hover .eckb-toolbar-button-text{color:#000000;}.eckb-article-content-toolbar-button-container:hover .eckb-toolbar-button-icon{color:#000000;}#eckb-article-content-header-row-2{margin-bottom:0px;}#eckb-article-content-header-row-2 .eckb-article-content-header-row-left-group,#eckb-article-content-header-row-2 .eckb-article-content-header-row-right-group{align-items:flex-end;}#eckb-article-content .eckb-article-title{font-size:50px !important;}#eckb-article-content-header-row-3{margin-bottom:32px;}#eckb-article-content-header-row-3 .eckb-article-content-header-row-left-group,#eckb-article-content-header-row-3 .eckb-article-content-header-row-right-group{align-items:flex-end;}#eckb-article-content-footer .epkb-article-navigation-container a{background-color:#f7f7f7;color:#1e73be;}#eckb-article-content-footer .epkb-article-navigation-container a:hover{background-color:#dee3e5;color:#6d6d6d;}#eckb-article-body .eckb-article-toc ul a.active{background-color:#24629b;color:#ffffff;}#eckb-article-body .eckb-article-toc ul a:hover{background-color:#f2f2f2;color:#000000;}#eckb-article-body .eckb-article-toc__inner{border-color:#9ccdfb;font-size:14px !important;background-color:#fcfcfc;}#eckb-article-body .eckb-article-toc__inner a{color:#9ccdfb;font-size:14px !important;}#eckb-article-body .eckb-article-toc__title{color:#9ccdfb;font-size:15px !important;}<\/style>   ","protected":false},"excerpt":{"rendered":"<p>Skip to main content What can we help you with? Search &lt; All Topics Main Network, Cybersecurity, and Best Practices Removing VPN From your Mac Print Removing VPN From your Mac UpdatedAugust 31, 2022 To uninstall GlobalProtect VPN from your Mac follow these steps: 1.Launch a web browser and enter the following URL: vpn.wooster.edu 2. [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"epkb_post_type_1_category":[210],"epkb_post_type_1_tag":[],"coauthors":[288],"class_list":["post-1494","epkb_post_type_1","type-epkb_post_type_1","status-publish","hentry","epkb_post_type_1_category-network"],"acf":[],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":""},"post_excerpt_stackable":"<p>Skip to main content What can we help you with? Search &lt; All Topics Main Network, Cybersecurity, and Best Practices Removing VPN From your Mac Print Removing VPN From your Mac UpdatedAugust 31, 2022 To uninstall GlobalProtect VPN from your Mac follow these steps: 1.Launch a web browser and enter the following URL: vpn.wooster.edu 2. On the GlobalProtect portal page you will login with your username and password. GlobalProtect Login Portal 3. Once logged in the download page will open, select Download Mac 32\/64 bit GlobalProtect agent. Paloalto Download Menu 4. Run the software 5. Run the GlobalProtect Installer 6.&hellip;<\/p>\n","category_list":"<a href=\"https:\/\/inside.wooster.edu\/technology\/knowledge-base\/category\/network\/\" rel=\"category tag\">Network, Cybersecurity, and Best Practices<\/a>","author_info":{"name":"Samantha Mowrer","url":"https:\/\/inside.wooster.edu\/technology\/author\/smowrerwooster-edu\/"},"comments_num":"0 comments","uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Samantha Mowrer","author_link":"https:\/\/inside.wooster.edu\/technology\/author\/smowrerwooster-edu\/"},"uagb_comment_info":0,"uagb_excerpt":"Skip to main content What can we help you with? Search &lt; All Topics Main Network, Cybersecurity, and Best Practices Removing VPN From your Mac Print Removing VPN From your Mac UpdatedAugust 31, 2022 To uninstall GlobalProtect VPN from your Mac follow these steps: 1.Launch a web browser and enter the following URL: vpn.wooster.edu 2.&hellip;","_links":{"self":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/epkb_post_type_1\/1494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/epkb_post_type_1"}],"about":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/types\/epkb_post_type_1"}],"author":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/comments?post=1494"}],"version-history":[{"count":2,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/epkb_post_type_1\/1494\/revisions"}],"predecessor-version":[{"id":29262,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/epkb_post_type_1\/1494\/revisions\/29262"}],"wp:attachment":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media?parent=1494"}],"wp:term":[{"taxonomy":"epkb_post_type_1_category","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/epkb_post_type_1_category?post=1494"},{"taxonomy":"epkb_post_type_1_tag","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/epkb_post_type_1_tag?post=1494"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/coauthors?post=1494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}