www.trellix.com Open in urlscan Pro
2a02:26f0:ab00::214:8e5a  Public Scan

URL: https://www.trellix.com/en-in/downloads/free-tools/getsusp.html
Submission: On April 16 via manual from IN — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="container-xl px-md-6 d-flex py-2 gap-3" id="searchForm">
  <input class="flex-grow-1 form-control custom-mobile-search-field p-2 border-1 rounded-0" placeholder="Search" aria-label="Search" id="msearch" data-result-path="/en-us/search.html">
  <button class="btn btn-primary" type="submit">Submit</button>
  <div class="d-none d-lg-flex gap-2 align-items-center">
    <a href="#" onclick="document.getElementById('msearch').value = ''" datalink-type="internal" datalink-id="newco:#">Clear</a>
    <span>|</span>
    <a id="searchTip" class="no-break" href="#" data-bs-toggle="modal" data-bs-target="#searchTipModal" datalink-type="internal" datalink-id="newco:#">Search Tips</a>
  </div>
</form>

Text Content

News Contact Search
Deutsch (Deutschland) English (Australia) English (Canada) English (United
Kingdom) English (Hong Kong SAR China) English (India) English (Singapore)
English (United States) español (España) español (México) français (Canada)
français (France) italiano (Italia) 日本語 (日本) 한국어(대한민국) português (Brasil)
русский (Россия) 中文 (简体,中国) 中文 (繁體,台灣)
Submit
Clear | Search Tips
Why Trellix? Products Research Support Partners Resources
Search Menu
Why Trellix?
Products
Research
Support
Partners
Resources
Stories
Contact Us
Main menu
COMPANY
Why Trellix? About Us Industry Recognitions Leadership Corporate Social
Responsibility Careers Contact Us
COMPETITION
vs Crowdstrike vs SentinelOne
Main menu
PRODUCTS
Trellix XDR Endpoint Security SecOps and Analytics Data Security Network
Detection and Response Threat Intelligence Collaboration Security Cloud Security
View All Products
Main menu
RESEARCH
Advanced Research Center Adversarial & Vulnerability Research Reports
Main menu
SUPPORT
Product Support Downloads Product Documentation
CONTACT US
Detection Dispute Form Submit a Sample
MCAFEE ENTERPRISE
Support Portal Customer Success Plans
FIREEYE
Get Support
Main menu
PARTNERS
Partners Overview Solution Providers Security Innovation Alliance OEM & Embedded
Alliances
PARTNER PORTAL
Trellix Partner Portal Login
Main menu
RESOURCES
Training and Education Consulting Services Webinars Events Case Studies Resource
Library
MEDIA
Press Releases News Stories View Newsroom
INTEGRATIONS
Marketplace Developer Portal Trellix Login Trellix Free Trial
SECURITY AWARENESS
What is XDR? What is Endpoint Security? What is EDR? What is MITRE? What is
Ransomware? View All Topics
COMPANY

--------------------------------------------------------------------------------

Why Trellix? About Us Industry Recognitions Leadership Corporate Social
Responsibility Careers Contact Us
COMPETITION

--------------------------------------------------------------------------------

vs Crowdstrike vs SentinelOne
Trellix Xpand Recap



PRODUCTS

--------------------------------------------------------------------------------

Trellix XDR Endpoint Security SecOps and Analytics Data Security Network
Detection and Response Threat Intelligence Collaboration Security Cloud Security
View All Products
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always
learning.

Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat
prevention, detection and response."

RESEARCH

--------------------------------------------------------------------------------

Advanced Research Center Adversarial & Vulnerability Research Reports
Trellix Launches Advanced Research Center

Trellix announced the establishment of the Trellix Advanced Research Center to
advance global threat intelligence.

Latest Report

Trellix Advanced Research Center analyzes Q4 2022 threat data on ransomware,
nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.

SUPPORT

--------------------------------------------------------------------------------

Product Support Downloads Product Documentation
CONTACT US

--------------------------------------------------------------------------------

Detection Dispute Form Submit a Sample
MCAFEE ENTERPRISE

--------------------------------------------------------------------------------

Support Portal Customer Success Plans
FIREEYE

--------------------------------------------------------------------------------

Get Support
PARTNERS

--------------------------------------------------------------------------------

Partners Overview Solution Providers Security Innovation Alliance OEM & Embedded
Alliances
PARTNER PORTAL

--------------------------------------------------------------------------------

Trellix Hive Login Become a Partner
Welcome Trellix Partners



RESOURCES

--------------------------------------------------------------------------------

Training and Education Consulting Services Webinars Events Case Studies Resource
Library
MEDIA

--------------------------------------------------------------------------------

Press Releases News Stories View Newsroom
INTEGRATIONS

--------------------------------------------------------------------------------

Marketplace Developer Portal Trellix Login Trellix Free Trial
SECURITY AWARENESS

--------------------------------------------------------------------------------

What is XDR? What is Endpoint Security? What is EDR? What is MITRE? What is
Ransomware? View All Topics


GETSUSP

 * Home
 * Downloads
 * Free-Tools

--------------------------------------------------------------------------------


HOW TO USE GETSUSP

Trellix GetSusp eliminates the need for deep technical knowledge of computer
systems to isolate undetected malware. It does this by using a combination of
heuristics and querying the Trellix Global Threat Intelligence (GTI) File
Reputation database to gather suspicious files.

GetSusp is recommended as a first tool of choice when analyzing a suspect
computer. However, one must follow the existing Trellix support process for
escalating suspicious files it finds.

GetSusp includes the following features:

 * Delivered as a single executable file with no installation required
 * Option to run in several modes—GUI, command line and ePO mode
 * Scans URLs, Documents, PDFs in GUI mode
 * Option to select files before submitting to McAfee in GUI mode
 * Leverages GTI File Reputation to determine if the sample is suspicious
 * Records system and installed McAfee product information date of execution and
   details of suspected files
 * GetSusp supports Windows Server 2008 R2 SP1, Windows Server 2012, Windows
   Server 2016 and Windows 7, 8, 8.1, 10 (up to RS6), 19H1, 19H2, 20H1, 20H2,
   21H1, 21H2.
   

 1. Download the latest version of GetSusp. When prompted, choose to save the
    executable file to a convenient location on your hard disk. We recommend
    creating a folder specifically for GetSusp. file.
    
    Download GetSusp (32-bit) Download GetSusp (64-bit)
    
    The build below is for Trellix ePO administrators.
    
    Download GetSusp-ePO (32-bit) Download GetSusp-ePO (64-bit) Download
    Extension Reports
 2. Once downloaded, launch the GetSusp.exe.
 3. The Trellix GetSusp Interface will be displayed

For a list of Frequently Asked Questions on GetSusp, see article KB 69385.


BUILDING A CULTURE OF SECURITY

Businesses have too much to lose if they don't prioritize security at every
entry level. With more date to protect and cyberthreats eveolving, everyone must
play a part in creating a culture of security. Let our Free Tools help implement
a 'security-first' mindset across your entire company

Need a little more protectionfor your business?

Explore the Trellix Platform


--------------------------------------------------------------------------------

About Why Trellix? About Us Explore Products Leadership Careers
News and Events Newsroom Press Releases Blogs Webinars Events
Resources Security Awareness Resource Library Training and Education
Communication Preferences Shop Online
Support Support Customer Success Plans Downloads Product Documentation
Trellix Contact Us
Copyright © 2023 Musarubra US LLC | Privacy | Legal | Terms of Service


SEARCH TIPS


Be concise and specific:

Wrong: I want to learn how to migrate to Trellix Endpoint Security

Right: Trellix Endpoint Security migration

Use quotation marks to find a specific phrase:

“migrate to Trellix Endpoint security”

Use sets of quotation marks to search for multiple queries:

“endpoint security” “Windows”

Punctuation and special characters are ignored:

Avoid these characters: `, ~, :, @, #, $, %, ^, &, =, +, <, >, (, )

The search engine is not case sensitive:

Endpoint security, endpoint security, and ENDPOINT SECURITY will all yield the
same results.

Close
Recommended For You
For YouTrending
trellix-endpoint-security-datasheet

Seven Steps to Ease the Pain of Managing a SOC White Paper

Free Tools | Trellix Downloads
Contact Us