Trellix GetSusp eliminates the need for deep technical knowledge of computer systems to isolate undetected malware. It does this by using a combination of heuristics and querying the Trellix Global Threat Intelligence (GTI) File Reputation database to gather suspicious files.
GetSusp is recommended as a first tool of choice when analyzing a suspect computer. However, one must follow the existing Trellix support process for escalating suspicious files it finds.
GetSusp includes the following features:
Download the latest version of GetSusp. When prompted, choose to save the executable file to a convenient location on your hard disk. We recommend creating a folder specifically for GetSusp. file.Download GetSusp for 32-bit systems Download GetSusp for 64-bit systems
The build below is for Trellix ePO administrators.Download GetSusp-ePO for 32-bit systems Download GetSusp-ePO for 64-bit systems Download GetSusp-ePO Extension Reports
For a list of Frequently Asked Questions on GetSusp, see article KB 69385.
Businesses have too much to lose if they don't prioritize security at every entry level. With more date to protect and cyberthreats eveolving, everyone must play a part in creating a culture of security. Let our Free Tools help implement a 'security-first' mindset across your entire company
Need a little more protectionfor your business?Explore the Trellix Platform