Advanced Search
Search Results
837 total results found
Individual and group tasks
The ability to track and understand every action taken is crucial. The management system offers several views to explore past operations in detail, monitor ongoing tasks, identify errors, and collaborate effectively across teams. The My Tasks section allows y...
Task Analysis
For each listed task, you can access acomplete description that includes: The total number of machines affected The progress rate (successes, errors, stopped transfers) Download or permission errors The associated execution log This data is essentia...
Chapter 10: Updates
How the WSUS update module works.
Medulla offers an effective solution to replace the WSUS (Windows Server Update Services) server. This guide explains how Medulla’s update module works. How It Works: Update Source: Medulla retrieves updates from the wsusscn2.cab file, a database maintained b...
Entity Compliance
Update management is a key factor in ensuring the security, stability, and consistency of your IT environment. Using the tools provided by the platform, you can precisely identify which entities need updating, track overall compliance, and take targeted, phase...
Entity Compliance Tracking
Update compliance is an indicator of the health of your IT infrastructure. The higher it is, the more protected and aligned your systems are. Best practices: Regularly check entities with a compliance rate below 100% Analyze the causes of non-compliant mac...
Manage update lists
Medulla’s update management module replaces Microsoft’s WSUS solution. How it works: The Medulla server retrieves the list of updates—available based on the criteria defined during server installation or configuration—and makes them available to the various c...
Upgrading to major OS versions.
The update module in Medulla allows you to perform version updates directly from the Medulla interface via the Major Updates tab: By clicking the Major Updates button, you will see the compliance view and view machines sorted by entity. For each entity, you ...
Automatically approve whitelisted updates.
In Medulla’s WSUS module, an option allows you to automatically approve a type of update and thus automatically whitelist it. Once whitelisted, these types of updates will be deployed to the machines that require them. To do this: Click on the Updates tab in ...
Microsoft Product Validation
By going to the "Microsoft Product Validation" submenu, you can choose whether or not to validate a Microsoft product category for updating. This system prevents your update module from being cluttered with products you do not wish to manage. Simply check t...
Chapter 11: Backup
Enable backup
A good backup policy is the key to a resilient infrastructure. Whether due to hardware failure, human error, or an attack, a properly configured backup solution ensures you can quickly restore data and maintain business continuity without interruption. Backups...
Track backups
Real-time backup monitoring allows you to verify that all tasks have been executed correctly. Access: Main Menu > Reports Logs Menu → View technical messages and their occurrence times for each backup task. In case of an error: View the detailed logs. Id...
Overall statistics
You have key metrics to assess the overall status of your backups. Access: Review > Global Statistics Disk space used: total size of backups across all clients Active / backed-up machines Successful / Failed Backups Implementing a backup strategy is ...
Chapter 12: History
Access the logs
This chapter presents the various features related to system history via logs. Each section is described step by step to facilitate the viewing, analysis, and use of recorded events. Objective: View the events recorded by each system component. Steps: Open ...
Search and filter logs
To quickly extract specific events based on defined criteria to improve efficiency during analysis. Steps: Define a search period In the Start Date and End Date fields, specify the desired time range. Example: Start Date: 2025-04-14 00:00:00 End Da...
Understanding the logs
To interpret the information contained in each line of the log. Each entry in the table contains the following columns: Date: Date and time of the event User: Account that generated the action Who: Machine or service involved Text: Description of the a...