www.trellix.com
Open in
urlscan Pro
2a02:26f0:ab00::214:8e5a
Public Scan
URL:
https://www.trellix.com/en-in/downloads/free-tools/getsusp.html
Submission: On April 16 via manual from IN — Scanned from DE
Submission: On April 16 via manual from IN — Scanned from DE
Form analysis
1 forms found in the DOM<form class="container-xl px-md-6 d-flex py-2 gap-3" id="searchForm">
<input class="flex-grow-1 form-control custom-mobile-search-field p-2 border-1 rounded-0" placeholder="Search" aria-label="Search" id="msearch" data-result-path="/en-us/search.html">
<button class="btn btn-primary" type="submit">Submit</button>
<div class="d-none d-lg-flex gap-2 align-items-center">
<a href="#" onclick="document.getElementById('msearch').value = ''" datalink-type="internal" datalink-id="newco:#">Clear</a>
<span>|</span>
<a id="searchTip" class="no-break" href="#" data-bs-toggle="modal" data-bs-target="#searchTipModal" datalink-type="internal" datalink-id="newco:#">Search Tips</a>
</div>
</form>
Text Content
News Contact Search Deutsch (Deutschland) English (Australia) English (Canada) English (United Kingdom) English (Hong Kong SAR China) English (India) English (Singapore) English (United States) español (España) español (México) français (Canada) français (France) italiano (Italia) 日本語 (日本) 한국어(대한민국) português (Brasil) русский (Россия) 中文 (简体,中国) 中文 (繁體,台灣) Submit Clear | Search Tips Why Trellix? Products Research Support Partners Resources Search Menu Why Trellix? Products Research Support Partners Resources Stories Contact Us Main menu COMPANY Why Trellix? About Us Industry Recognitions Leadership Corporate Social Responsibility Careers Contact Us COMPETITION vs Crowdstrike vs SentinelOne Main menu PRODUCTS Trellix XDR Endpoint Security SecOps and Analytics Data Security Network Detection and Response Threat Intelligence Collaboration Security Cloud Security View All Products Main menu RESEARCH Advanced Research Center Adversarial & Vulnerability Research Reports Main menu SUPPORT Product Support Downloads Product Documentation CONTACT US Detection Dispute Form Submit a Sample MCAFEE ENTERPRISE Support Portal Customer Success Plans FIREEYE Get Support Main menu PARTNERS Partners Overview Solution Providers Security Innovation Alliance OEM & Embedded Alliances PARTNER PORTAL Trellix Partner Portal Login Main menu RESOURCES Training and Education Consulting Services Webinars Events Case Studies Resource Library MEDIA Press Releases News Stories View Newsroom INTEGRATIONS Marketplace Developer Portal Trellix Login Trellix Free Trial SECURITY AWARENESS What is XDR? What is Endpoint Security? What is EDR? What is MITRE? What is Ransomware? View All Topics COMPANY -------------------------------------------------------------------------------- Why Trellix? About Us Industry Recognitions Leadership Corporate Social Responsibility Careers Contact Us COMPETITION -------------------------------------------------------------------------------- vs Crowdstrike vs SentinelOne Trellix Xpand Recap PRODUCTS -------------------------------------------------------------------------------- Trellix XDR Endpoint Security SecOps and Analytics Data Security Network Detection and Response Threat Intelligence Collaboration Security Cloud Security View All Products Our CEO on Living Security Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning. Gartner® Report: Market Guide for XDR As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response." RESEARCH -------------------------------------------------------------------------------- Advanced Research Center Adversarial & Vulnerability Research Reports Trellix Launches Advanced Research Center Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence. Latest Report Trellix Advanced Research Center analyzes Q4 2022 threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails. SUPPORT -------------------------------------------------------------------------------- Product Support Downloads Product Documentation CONTACT US -------------------------------------------------------------------------------- Detection Dispute Form Submit a Sample MCAFEE ENTERPRISE -------------------------------------------------------------------------------- Support Portal Customer Success Plans FIREEYE -------------------------------------------------------------------------------- Get Support PARTNERS -------------------------------------------------------------------------------- Partners Overview Solution Providers Security Innovation Alliance OEM & Embedded Alliances PARTNER PORTAL -------------------------------------------------------------------------------- Trellix Hive Login Become a Partner Welcome Trellix Partners RESOURCES -------------------------------------------------------------------------------- Training and Education Consulting Services Webinars Events Case Studies Resource Library MEDIA -------------------------------------------------------------------------------- Press Releases News Stories View Newsroom INTEGRATIONS -------------------------------------------------------------------------------- Marketplace Developer Portal Trellix Login Trellix Free Trial SECURITY AWARENESS -------------------------------------------------------------------------------- What is XDR? What is Endpoint Security? What is EDR? What is MITRE? What is Ransomware? View All Topics GETSUSP * Home * Downloads * Free-Tools -------------------------------------------------------------------------------- HOW TO USE GETSUSP Trellix GetSusp eliminates the need for deep technical knowledge of computer systems to isolate undetected malware. It does this by using a combination of heuristics and querying the Trellix Global Threat Intelligence (GTI) File Reputation database to gather suspicious files. GetSusp is recommended as a first tool of choice when analyzing a suspect computer. However, one must follow the existing Trellix support process for escalating suspicious files it finds. GetSusp includes the following features: * Delivered as a single executable file with no installation required * Option to run in several modes—GUI, command line and ePO mode * Scans URLs, Documents, PDFs in GUI mode * Option to select files before submitting to McAfee in GUI mode * Leverages GTI File Reputation to determine if the sample is suspicious * Records system and installed McAfee product information date of execution and details of suspected files * GetSusp supports Windows Server 2008 R2 SP1, Windows Server 2012, Windows Server 2016 and Windows 7, 8, 8.1, 10 (up to RS6), 19H1, 19H2, 20H1, 20H2, 21H1, 21H2. 1. Download the latest version of GetSusp. When prompted, choose to save the executable file to a convenient location on your hard disk. We recommend creating a folder specifically for GetSusp. file. Download GetSusp (32-bit) Download GetSusp (64-bit) The build below is for Trellix ePO administrators. Download GetSusp-ePO (32-bit) Download GetSusp-ePO (64-bit) Download Extension Reports 2. Once downloaded, launch the GetSusp.exe. 3. The Trellix GetSusp Interface will be displayed For a list of Frequently Asked Questions on GetSusp, see article KB 69385. BUILDING A CULTURE OF SECURITY Businesses have too much to lose if they don't prioritize security at every entry level. With more date to protect and cyberthreats eveolving, everyone must play a part in creating a culture of security. Let our Free Tools help implement a 'security-first' mindset across your entire company Need a little more protectionfor your business? Explore the Trellix Platform -------------------------------------------------------------------------------- About Why Trellix? About Us Explore Products Leadership Careers News and Events Newsroom Press Releases Blogs Webinars Events Resources Security Awareness Resource Library Training and Education Communication Preferences Shop Online Support Support Customer Success Plans Downloads Product Documentation Trellix Contact Us Copyright © 2023 Musarubra US LLC | Privacy | Legal | Terms of Service SEARCH TIPS Be concise and specific: Wrong: I want to learn how to migrate to Trellix Endpoint Security Right: Trellix Endpoint Security migration Use quotation marks to find a specific phrase: “migrate to Trellix Endpoint security” Use sets of quotation marks to search for multiple queries: “endpoint security” “Windows” Punctuation and special characters are ignored: Avoid these characters: `, ~, :, @, #, $, %, ^, &, =, +, <, >, (, ) The search engine is not case sensitive: Endpoint security, endpoint security, and ENDPOINT SECURITY will all yield the same results. Close Recommended For You For YouTrending trellix-endpoint-security-datasheet Seven Steps to Ease the Pain of Managing a SOC White Paper Free Tools | Trellix Downloads Contact Us