1. Where Medusa Fits in a Defender's Workflow
Medusa is a network login brute-force/auditing tool used by defenders in authorized labs and assessments to validate credential controls and failed-login monitoring.
The role here is "Authentication auditing (dual-use)." That scoping matters. A triage tool used as an investigation tool produces the wrong level of depth; an investigation tool used as a monitoring tool burns analyst time. Pick the right phase, then pick the tool.
Start with a concrete question — "Is this service reachable from the DMZ?" or "Do we have stale DNS records for this domain?" — rather than opening the tool and seeing what turns up.