选择工具即可免费下载。 有关详细信息,请阅读 McAfee 软件免费工具最终用户许可协议

请注意,除工具说明中详细介绍的功能之外,这些工具不执行任何其他功能,也不包含任何恶意软件。

防恶意软件工具

GetQuarantine BETA

The McAfee GetQuarantine tool is intended for users who wish to submit files that are quarantined by McAfee Endpoint Security.

了解更多信息

GetSusp

McAfee GetSusp is intended for users who suspect undetected malware on their computer.

了解更多信息

McAfee Ransomware Recover

McAfee Ransomware Recover (Mr2) is a framework that supports the decryption of files that have been encrypted because of ransomware.

了解更多信息

Pinkslipbot Detection

A system previously infected with W32/Pinkslipbot may still be serving as a control server proxy for the malware. This tool detects and removes port-forwarding that is specific to Pinkslipbot.

了解更多信息

Ransomware Interceptor

Interceptor is an early-detection tool that prevents file encryption attempts by ransomware malware. This tool leverages heuristics and machine learning to identify such malware.

了解更多信息

RootkitRemover

McAfee RootkitRemover is a standalone utility used to detect and remove complex rootkits and associated malware. This tool can detect and remove ZeroAccess, Necurs and TDSS family of rootkits.

了解更多信息

Steganography Analysis Tool

Attacks using steganography could be poisoning your media traffic with serious consequences.

了解更多信息

Stinger

McAfee Stinger is a standalone utility used to detect and remove specific viruses. It’s not a substitute for full antivirus protection, but a specialized tool to assist administrators and users when dealing with infected system.

了解更多信息

加密工具

EZ Tool Series of Utilities

The EZ Tool Series of Utilities includes updates that correspond with MDE product releases and engage support for assistance and feedback on tools prior to their release dates. This series also assists in troubleshooting and data recovery for McAfee Drive Encryption.

了解更多信息

Tesladecrypt

Tesladecrypt will decrypt TeslaCrypt encrypted files with the following extensions: .mp3, .micro, .xxx, and .ttt.

了解更多信息

构建安全文化

如果企业没有在各个级别设定安全优先级,则会造成巨大损失。 随着要保护的数据日益增多,面临的网络威胁也不断涌现,每个人都必须在构建安全文化方面发挥作用。 这里提供了一些工具和资源,可帮助您在整个企业中树立“安全第一”的理念。

了解更多信息