Select a tool and download it for FREE! For more details, read the Trellix Software Free Tools End User License Agreement. Please note that these tools do not perform any function other than what is detailed in their descriptions and do not contain malware.
Trellix FileInsight is a free analysis tool provided for security researchers. It can be used to view, dissect and analyze suspicious files and downloads.
The Trellix GetQuarantine tool is intended for users who wish to submit files that are quarantined by Trellix Endpoint Security.
Trellix GetSusp is intended for users who suspect undetected malware on their computer.
A system previously infected with W32/Pinkslipbot may still be serving as a control server proxy for the malware. This tool detects and removes port-forwarding that is specific to Pinkslipbot.
Interceptor is an early-detection tool that prevents file encryption attempts by ransomware malware. This tool leverages heuristics and machine learning to identify such malware.
Trellix Ransomware Recover (Tr2) is a framework that supports the decryption of files that have been encrypted because of ransomware.
Trellix RootkitRemover is a standalone utility used to detect and remove complex rootkits and associated malware. This tool can detect and remove ZeroAccess, Necurs and TDSS
This is a standalone utility used to detect and remove specific viruses. It’s not a substitute for full antivirus protection, but a specialized tool to assist administrators and users when dealing with infected system.
The EZ Tool Series of Utilities includes updates that correspond with MDE product releases and engage support for assistance and feedback on tools prior to their release dates. This series also assists in troubleshooting and data recovery for Trellix Drive Encryption.
Tesladecrypt will decrypt TeslaCrypt encrypted files with the following extensions: .mp3, .micro, .xxx, and .ttt.
Businesses have too much to lose if they don’t prioritize security at every level. With more data to protect and cyberthreats evolving, everyone must play a part in creating a culture of security. Let our Free Tools and resources to help implement a “security-first” mindset across your entire company.
Be concise and specific:
Wrong: I want to learn how to migrate to Trellix Endpoint Security
Right: Trellix Endpoint Security migration
Use quotation marks to find a specific phrase:
“migrate to Trellix Endpoint security”
Use sets of quotation marks to search for multiple queries:
“endpoint security” “Windows”
Punctuation and special characters are ignored:
Avoid these characters: `, ~, :, @, #, $, %, ^, &, =, +, <, >, (, )
The search engine is not case sensitive:
Endpoint security, endpoint security, and ENDPOINT SECURITY will all yield the same results.