www.trellix.com
Open in
urlscan Pro
2a02:26f0:7100::5f64:87c0
Public Scan
URL:
https://www.trellix.com/downloads/free-tools/getsusp/
Submission: On March 12 via manual from FR — Scanned from NL
Submission: On March 12 via manual from FR — Scanned from NL
Form analysis
1 forms found in the DOM<form class="px-3 d-flex align-items-center gap-2 bi bi-search" id="searchForm">
<input class="custom-mobile-search-field flex-grow-1" placeholder="Search Trellix" aria-label="Search" id="msearch" data-result-path="/search/">
<button class="btn btn-primary me-2 px-2 py-0 bg-transparent text-primary border-0" type="submit">Search</button>
<div class="d-none d-lg-flex gap-2 align-items-center">
<a href="#" onclick="document.getElementById('msearch').value = ''" datalink-type="internal" datalink-id="newco:#">Clear</a>
<span>|</span>
<a id="searchTip" class="no-break" href="#" data-bs-toggle="modal" data-bs-target="#searchTipModal" datalink-type="internal" datalink-id="newco:#">Search Tips</a>
</div>
</form>
Text Content
-------------------------------------------------------------------------------- * Government * Support * Contact * Login Trellix Login Trellix Hive Developer Portal Marketplace * Search Search Clear | Search Tips QUICK LINKS Why Trellix? | Products | Advanced Research Center | Newsroom | Blogs * Change Language Australia (English) Brasil (Português) Canada (English) Canada (Français) Deutschland (Deutsch) España (Español) France (Français) Hong Kong (English) India (English) Italia (Italiano) 日本 (日本語) 대한민국 (한국어) México (Español) Singapore (English) United Kingdom (English) United States (English) * Platform * Services * Research * Partners * Resources * About PRODUCT CATEGORIES -------------------------------------------------------------------------------- XDR Engine Endpoint Security SecOps and Analytics Data Security Network Security Threat Intelligence Email Security Cloud Security View All Products Trellix XDR Platform Strengthen your security posture and protect your organization with confidence. Ransomware Detection and Response Put ransomware nightmares to sleep. Minimize the time to detect, investigate, and respond to ransomware threats. PROFESSIONAL SERVICES -------------------------------------------------------------------------------- Trellix Thrive Solution Services Consulting and Threat Services EDUCATION AND TRAINING -------------------------------------------------------------------------------- Education Services Training Courses Trellix Thrive Make the most of your investment in Trellix’s industry-leading cybersecurity technologies. RESEARCH -------------------------------------------------------------------------------- Advanced Research Center Threat Intelligence Product Research Vulnerability Research and Red Team Reports Latest Research Blogs Get the latest cybersecurity trends, best practices, security vulnerabilities, and more. Latest Report Authored by Trellix’s Advanced Research Center, this report highlights insights, intelligence, and guidance gleaned from multiple sources of critical data. PARTNERS -------------------------------------------------------------------------------- Partners Overview Security Innovation Alliance OEM & Embedded Alliances PARTNER PORTAL -------------------------------------------------------------------------------- Trellix Hive Login Become a Partner MANAGED DETECTION AND RESPONSE -------------------------------------------------------------------------------- Managed Detection and Response Services What is Managed Detection and Response? RESOURCES -------------------------------------------------------------------------------- Webinars Weekly Tech Talk Series Events Resource Library SECURITY AWARENESS -------------------------------------------------------------------------------- What is XDR? What is Endpoint Security? What is EDR? What is MITRE? What is Ransomware? View All Topics Weekly Tech Talk Series Join Trellix technical experts in a weekly 30-minute tech talk webinar series. COMPANY -------------------------------------------------------------------------------- Why Trellix? About Us Leadership Industry Recognition Customer Stories MEDIA -------------------------------------------------------------------------------- Press Releases Latest News Blogs View Newsroom CONNECT -------------------------------------------------------------------------------- Careers Contact Us Get Started Menu Platform Services Research Partners Resources About Get Started Support Contact Us Main menu PRODUCT CATEGORIES XDR Engine Endpoint Security SecOps and Analytics Data Security Network Detection and Response Threat Intelligence Email Security Cloud Security View All Products Main menu PROFESSIONAL SERVICES Trellix Thrive Solution Services Consulting and Threat Services EDUCATION AND TRAINING Education Services Training Courses Main menu RESEARCH Advanced Research Center Threat Intelligence Product Research Vulnerability Research and Red Team Reports Main menu PARTNERS Partners Overview Security Innovation Alliance OEM & Embedded Alliances PARTNER PORTAL Trellix Partner Portal Login MANAGED DETECTION AND RESPONSE Managed Detection and Response Services What is Managed Detection and Response? Main menu RESOURCES Webinars Weekly Tech Talk Series Events Resource Library LOGIN Trellix Login Trellix Free Trial Developer Portal Marketplace SECURITY AWARENESS What is XDR? What is Endpoint Security? What is EDR? What is MITRE? What is Ransomware? View All Topics Main menu COMPANY Why Trellix? About Us Leadership Industry Recognition Customer Stories MEDIA Press Releases News Stories View Newsroom CONNECT Careers Contact Us Request a Demo Cybersecurity Assessment Latest Trellix Events Contact Us GETSUSP 1. Home 2. Downloads 3. Free Tools 4. Getsusp -------------------------------------------------------------------------------- HOW TO USE GETSUSP Trellix GetSusp eliminates the need for deep technical knowledge of computer systems to isolate undetected malware. It does this by using a combination of heuristics and querying the Trellix Global Threat Intelligence (GTI) File Reputation database to gather suspicious files. GetSusp is recommended as a first tool of choice when analyzing a suspect computer. However, one must follow the existing Trellix support process for escalating suspicious files it finds. GetSusp includes the following features: * Delivered as a single executable file with no installation required * Option to run in several modes—GUI, command line and ePO mode * Scans URLs, Documents, PDFs in GUI mode * Option to select files before submitting to Trellix in GUI mode * Leverages GTI File Reputation to determine if the sample is suspicious * Records system and installed Trellix product information date of execution and details of suspected files * GetSusp supports Windows Server 2008 R2 SP1, Windows Server 2012, Windows Server 2016 and Windows 7, 8, 8.1, 10 (up to RS6), 19H1, 19H2, 20H1, 20H2, 21H1, 21H2 and Windows 11. 1. Download the latest version of GetSusp. When prompted, choose to save the executable file to a convenient location on your hard disk. We recommend creating a folder specifically for GetSusp. file. Download GetSusp (32-bit) Download GetSusp (64-bit) The build below is for Trellix ePO administrators. Download GetSusp-ePO (32-bit) Download GetSusp-ePO (64-bit) Download Extension Reports 2. Once downloaded, launch the GetSusp.exe. 3. The Trellix GetSusp Interface will be displayed For a list of Frequently Asked Questions on GetSusp, see article KB 69385. BUILDING A CULTURE OF SECURITY Businesses have too much to lose if they don't prioritize security at every entry level. With more date to protect and cyberthreats eveolving, everyone must play a part in creating a culture of security. Let our Free Tools help implement a 'security-first' mindset across your entire company Need a little more protectionfor your business? Explore the Trellix Platform -------------------------------------------------------------------------------- Product Categories XDR Engine Endpoint Security SecOps and Analytics Data Security Network Security Threat Intelligence Email Security Cloud Security Request a Demo View All Products About Why Trellix? About Us Leadership Careers at Trellix Corporate Social Responsibility News and Events Newsroom Press Releases Blogs Webinars Events Support Support Downloads Product Documentation Submit a Sample Resources Security Awareness Resource Library Advanced Research Center Training and Education Communication Preferences Connect with Trellix Contact Us Trellix Store Shop Online Copyright © 2024 Musarubra US LLC | Privacy | Legal | Terms of Service SEARCH TIPS Be concise and specific: Wrong: I want to learn how to migrate to Trellix Endpoint Security Right: Trellix Endpoint Security migration Use quotation marks to find a specific phrase: “migrate to Trellix Endpoint security” Use sets of quotation marks to search for multiple queries: “endpoint security” “Windows” Punctuation and special characters are ignored: Avoid these characters: `, ~, :, @, #, $, %, ^, &, =, +, <, >, (, ) The search engine is not case sensitive: Endpoint security, endpoint security, and ENDPOINT SECURITY will all yield the same results. Close