Advanced Search
Search Results
378 total results found
How the WSUS update module works.
Medulla offers an effective solution to replace the WSUS (Windows Server Update Services) server. This guide explains how Medulla’s update module works. How It Works: Update Source: Medulla retrieves updates from the wsusscn2.cab file, a database maintained b...
Entity Compliance
Update management is a key factor in ensuring the security, stability, and consistency of your IT environment. Using the tools provided by the platform, you can precisely identify which entities need updating, track overall compliance, and take targeted, phase...
Entity Compliance Tracking
Update compliance is an indicator of the health of your IT infrastructure. The higher it is, the more protected and aligned your systems are. Best practices: Regularly check entities with a compliance rate below 100% Analyze the causes of non-compliant mac...
Manage update lists
Medulla’s update management module replaces Microsoft’s WSUS solution. How it works: The Medulla server retrieves the list of updates—available based on the criteria defined during server installation or configuration—and makes them available to the various c...
Upgrading to major OS versions.
The update module in Medulla allows you to perform version updates directly from the Medulla interface via the Major Updates tab: By clicking the Major Updates button, you will see the compliance view and view machines sorted by entity. For each entity, you ...
Automatically approve whitelisted updates.
In Medulla’s WSUS module, an option allows you to automatically approve a type of update and thus automatically whitelist it. Once whitelisted, these types of updates will be deployed to the machines that require them. To do this: Click on the Updates tab in ...
Microsoft Product Validation
By going to the "Microsoft Product Validation" submenu, you can choose whether or not to validate a Microsoft product category for updating. This system prevents your update module from being cluttered with products you do not wish to manage. Simply check t...
Enable backup
A good backup policy is the key to a resilient infrastructure. Whether due to hardware failure, human error, or an attack, a properly configured backup solution ensures you can quickly restore data and maintain business continuity without interruption. Backups...
Track backups
Real-time backup monitoring allows you to verify that all tasks have been executed correctly. Access: Main Menu > Reports Logs Menu → View technical messages and their occurrence times for each backup task. In case of an error: View the detailed logs. Id...
Overall statistics
You have key metrics to assess the overall status of your backups. Access: Review > Global Statistics Disk space used: total size of backups across all clients Active / backed-up machines Successful / Failed Backups Implementing a backup strategy is ...
Access the logs
This chapter presents the various features related to system history via logs. Each section is described step by step to facilitate the viewing, analysis, and use of recorded events. Objective: View the events recorded by each system component. Steps: Open ...
Search and filter logs
To quickly extract specific events based on defined criteria to improve efficiency during analysis. Steps: Define a search period In the Start Date and End Date fields, specify the desired time range. Example: Start Date: 2025-04-14 00:00:00 End Da...
Understanding the logs
To interpret the information contained in each line of the log. Each entry in the table contains the following columns: Date: Date and time of the event User: Account that generated the action Who: Machine or service involved Text: Description of the a...
Export logs
To save logs for external analysis, archiving, or sharing. Steps: Apply your filters (by date, user, etc.) to isolate the desired logs. Click the Export button (or Export logs, depending on the interface). Choose the output format: CSV: for processing...
List of XMPP relays
XMPP relays are communication points between the various machines on your network. Why this is useful: This allows you to see all active connections and understand how machines communicate with each other. Steps: In the menu, click “List of Relays”. A pag...
Cluster List
Acluster is a group of relays that are grouped together to organize the network in a more logical way. Why this is useful: It helps you better manage your network, especially if you have different environments (e.g., test, production, etc.). Steps: Go to th...
Create a cluster
Creating acluster allows you to better organize your relays according to your needs (for example, separating testing from production). This is exactly the same form as the edit form. Steps: Click “New Cluster” in the menu. Click the “Add a new cluster” b...
Manage rules
Rules allow you to automate certain network actions or behaviors. Why this is useful: For example, this can trigger an automatic check or apply specific settings based on defined conditions. Steps: Click “Rules” in the menu. On the page, you can: Change...