Advanced Search
Search Results
837 total results found
Export logs
To save logs for external analysis, archiving, or sharing. Steps: Apply your filters (by date, user, etc.) to isolate the desired logs. Click the Export button (or Export logs, depending on the interface). Choose the output format: CSV: for processing...
Chapter 13: Admin
List of XMPP relays
XMPP relays are communication points between the various machines on your network. Why this is useful: This allows you to see all active connections and understand how machines communicate with each other. Steps: In the menu, click “List of Relays”. A pag...
Cluster List
Acluster is a group of relays that are grouped together to organize the network in a more logical way. Why this is useful: It helps you better manage your network, especially if you have different environments (e.g., test, production, etc.). Steps: Go to th...
Create a cluster
Creating acluster allows you to better organize your relays according to your needs (for example, separating testing from production). This is exactly the same form as the edit form. Steps: Click “New Cluster” in the menu. Click the “Add a new cluster” b...
Manage rules
Rules allow you to automate certain network actions or behaviors. Why this is useful: For example, this can trigger an automatic check or apply specific settings based on defined conditions. Steps: Click “Rules” in the menu. On the page, you can: Change...
Quick Actions
Each XMPP relay has a setof quick actions that allow you to interact directly with the machines it manages. These actions are accessible from the list of relays and are designed to simplify common administration, diagnostic, or configuration tasks without req...
Chapter 14: MDM
Chapter 15: CVE
CVE Module (Concept and Principles)
Medulla has introduced a new feature that allows the inventory database to be compared with CVE search APIs based on three CVE database models: NVD (U.S.), CIRCL (Luxembourg), and EUVD (European Union). This real-time comparison of the inventory database with ...
CVE operation
When you access the CVE module, it provides an overview of the CVEs across the infrastructure, their severity, and the number of affected machines. By clicking on the CVE summary banner, you can create groups based on severity. You can also click the trash can...
Results view by machine
Result view by machine: In this view, you will see all machines affected by CVEs: Machine name CVSS Score Number of critical CVEs Number of high-severity CVEs Number of medium CVEs Number of low-severity CVEs Total CVEs per machine The three actions for vie...
Results view by entity
Results view by entity: This view displays only the entity-based view and includes the following information: Entity name Number of machines in the entity CVSS score Number of critical CVEs Number of high-severity CVEs Number of medium CVEs Number of low-se...
Results view by group
Results View by Group This view displays only the machine group view and includes the following information: Group name Group type Number of machines per group CVSS score Number of critical CVEs Number of high-severity CVEs Number of medium CVEs Number of lo...
View all CVEs
View all CVEs Here you will find all CVEs and the following information: The CVE ID Severity The CVSS score The affected software The number of affected machines Description Detailed action. When you click on "Details," you will see the CVE record that was ...
CVE settings.
In the settings menu, you will be able to configure Display filters Software filters CVE filters Publisher filters Machine filters Group filters Display filters: You can select display filters based on the following options: Minimum CVSS Score Minimu...
Case Studies
Dynamic group with multiple criteria
To update applications, we can create a dynamic group using a combination of criteria: For example, I want to create a dynamic group that contains Windows 11 Pro machines, a specific software, and a specific software version. We add a section, "Installed Soft...