Privacy Eraser v5.25
The all-in-one privacy suite, PC optimization, and cleaning tool to protect your privacy and make your computer faster, more secure, and more efficient! This article will serve as an informative guide and give you a clear understanding of how to import Privacy Eraser into Microsoft Endpoint with the correct configuration for deployment.
Application Links
Privacy Eraser – Download URL
The below URL will give you the direct download links for Privacy Eraser.
https://www.cybertronsoft.com/download/privacy-eraser/
Application information
The below information is needed to be able to install Privacy Eraser. If no information is listed below then the default settings will work fine.
Name | Privacy Eraser |
Description | Description of the application. |
Publisher | Cybertron Software |
App Version | 5.25 |
Category | <Select what you think fits best> |
Show this as a featured app in the Company Portal | <if you want this app featured in the Company Portal> |
Information URL | https://www.cybertronsoft.com |
Privacy URL | https://www.cybertronsoft.com/privacy-policy |
Developer | Cybertron Software |
Owner | Internal contact within your business |
Notes | Internal notes |
Logo | Upload the Privacy Eraser Logo |
Program Information
Install Command | privacy-eraser-setup.exe /VERYSILENT /NORESTART |
Uninstall Command | “%ProgramFiles%\Cybertron\Privacy Eraser\unins000.exe” /VERYSILENT /NORESTART |
Install behavior | System |
The rest you can keep as default.
Requirements
Operating system architecture | 64-bit / 32-bit |
Minimum operating system | Windows 7 |
Disk space required (MB) | 20MB |
Physical memory required (MB) | 4GB |
Detection Rules
Rule format | Manually configure detection rules |
Rule type | File |
Path | C:\Program Files\Cybertron\Privacy Eraser |
File or folder | PrivacyEraser64.exe |
Detection method | File or folder exists |
Associated with a 32-bit app on 64-bit client | No |
Dependencies
Add your own as needed.
Supersedence
Again set this to your own needs.
Assignments
Depending on how you wish to deploy your application this is where you would select the users or computers.
Download
As with any download – Please use this at your own risk, and make sure you do your own testing before you deploy this application.