M-Explorer

M-Explorer is an installable (on-prem) admin interface that provides controlled file operations, auditable actions, and integrity checks for your systems. It is not an “anything goes” tool—the goal is stable operation and traceability.

What problem does it solve?

In many businesses, managing web files, configurations, and helper assets gradually becomes “tribal knowledge”: someone changes something, it works—until one day it doesn’t.

The issue is usually not malicious intent, but lack of control: there is no clear workflow, no audit trail, and no quick answer to “what changed and when”.

M-Explorer is designed to let necessary actions happen—but in a regulated, auditable, and traceable way—so stable operation isn’t a matter of luck.

Solution M-Explorer

Operational visibility

See what’s where in one place: files, folders, logs, core actions—and also when something deviates from the expected state.

Controlled operations

The system doesn’t “allow everything”: actions are tied to rules, limits, and logging. This reduces accidental mistakes and risky interventions.

Audit & integrity

Key events can be logged, and critical files can be monitored with integrity checks, so unauthorized or unexpected changes are detected quickly.

Security in practice

In M-Explorer, “security” is not a separate module but part of everyday operation: who can access what, what can be modified, and how files and documents move through controlled workflows. The goal is to support necessary operational tasks without granting unrestricted access.

Roles and operational permissions

Interface modules and actions are assigned to roles. What matters is not simply whether a user can log in, but which functions they can use and at what level (viewing, approval, modification).

Controlled workflows (Vault)

Incoming files do not land directly in critical system areas. In the Vault, they move through a structured process such as inbox → review → approval / relocation → archiving, replacing “accidental uploads” with deliberate, traceable steps.

Operational routine tasks in one place

Typical daily activities (log review, configuration changes, content fixes, blocking, ticket handling) are performed within a single interface. This avoids fragmented admin actions and creates a coherent, step-by-step workflow.

Security model and traceability

This section explains how actions can be reviewed afterwards, and how the system signals deviations from a known, stable state. This is not marketing language, but the technical footprint of operation: logs, integrity checks, and actionable alerts.

Audit log (append-only)

Events are recorded in an append-only manner: timestamp, action, affected object, user (and where applicable: client/IP). The purpose of the log is diagnostics and traceability, not assigning blame.

Integrity checks (baseline)

Critical files can be compared against a known, stable “baseline” state. If a deviation is detected, the system issues a warning, as the original behavior can no longer be guaranteed to originate from the same source.

Alerts: signals, not error reports

Alerts intentionally avoid excessive technical detail. Their purpose is to quickly indicate that verification is required, and—if necessary—to restore a known-good state in a controlled manner, rather than turning the interface into a source code analysis tool.

What does an alert mean?
Deviations from the baseline often have simple explanations: changes made during troubleshooting, manual updates, server-side replacements, or permission misclicks. This is not a “disaster”, but a signal to restore the system to a verified stable state in a controlled way.

If assistance is needed, our Helpdesk can quickly guide you through the steps.

Who is it for

Recommended if

  • controlled file and document operations are important, not just access
  • auditability and traceability are business or compliance requirements
  • unrestricted “manual changes” are not acceptable in production systems
  • you require an on-premise solution running on your own infrastructure
  • it matters to quickly detect deviations from an expected, stable state
  • there is a designated person or team responsible for system operation

Who is it not for

Not recommended if

  • you only need occasional or ad-hoc file management
  • you expect a system that “allows everything” without restrictions
  • you are looking exclusively for an instant, boxed SaaS / cloud service
  • there is no clear responsibility for operation or decision-making
  • regulated processes and audit logs do not provide real value for your use case

What does M-Explorer actually do?

M-Explorer is not designed to solve a single isolated task. It is a set of cooperating modules that together cover real operational workflows — from visibility and inspection to controlled intervention.

Unified overview

Files, data sources and system states coming from different locations are presented in a single, consistent interface.

No need to jump between multiple admin panels, logins or disconnected views.

Search and filtering

Manual browsing simply does not scale with large volumes of files or data.

M-Explorer provides targeted search and filtering mechanisms to quickly locate exactly what you are looking for.

Editing under control

Some configuration changes or file edits are unavoidable in real operations.

Built-in editing functions allow changes only within predefined boundaries, with full audit logging.

Document management (Vault)

Sensitive or business-critical documents are stored in an isolated, rule-driven environment.

Upload, move, download and print — without direct file system access.

Database access

M-Explorer is not limited to files; it can also display and manage selected database content in a controlled manner.

Not a full DB admin tool — focused, safe access for operational needs.

Roles and permissions

Not every user should see or modify everything.

Modules and actions are assigned to roles, preventing accidental or unauthorized changes.

Logging and traceability

Every relevant action is recorded: viewing, modification, movement.

Essential not only for troubleshooting, but also for audits.

Integrity monitoring

The system can detect changes in files that define core behavior.

This helps distinguish operational changes from external interference.

Designed for real workflows

M-Explorer does not aim to automate everything — it supports informed human decisions.

The goal is not “everything is allowed”, but “only what is necessary and permitted”.

M-Explorer is not a single module — it provides a controlled working environment for system access.

Typical real-world scenarios

Not a list of modules. These are concrete tasks that occur daily in operations, content management and internal system maintenance — handled in a controlled, traceable way.

Real-time file modification — “only that one line”

In production environments, release cycles are not always an option. Sometimes a fast, targeted change is required.

  • File open, preview and quick save
  • Role-based access (who may edit what)
  • Logged actions: who / when / what
Typical example: configuration fine-tuning, template fix, quick hotfix.

Search, filter, list — “find it in 10 seconds”

When you need to locate one problematic file or object among tens or hundreds of thousands.

  • Fast search by name, extension or pattern
  • Filtering by size, date or status
  • Custom list views: “only what matters”
Typical example: “where is this file”, “what changed yesterday”, “what is duplicated”.

Scan → processing → printing

From paper to digital: structured inbound document handling with a simple, operator-friendly workflow.

  • Scan/import with controlled storage
  • Quick preview and metadata-based organization
  • Controlled printing (who, what, when)
Typical example: contracts, delivery notes, reports, internal documents.

Safe conversion — “do not run it directly on production”

With risky or unknown formats, the goal is to minimize the chance that a conversion causes instability.

  • Conversion as a controlled process
  • Logged execution with error signaling
  • Consistent output (e.g. for archiving)
Typical example: “received PDF/DOCX looks suspicious, but must be handled safely”.

PO editor — quick translation fixes

No need for a development environment: change the text, apply it, and move on — under control.

  • Overview and editing of PO files
  • Instant validation (errors, missing keys)
  • Logged and traceable changes
Typical example: customer-reported “wrong translation / misleading label”.

Database listing + one-click cell editing

Small corrections should not require a full custom admin interface — but changes must remain controlled.

  • Table listing with fast search and filtering
  • One-click cell editing with permissions
  • Logged changes: who changed what and when
Typical example: wrong status, incorrect field value, typo in an identifier.
Important
The goal is not to allow “anyone to change anything”, but to provide a transparent, rule-based way to perform necessary operations. If a task is too risky, we design a proper workflow around it.

Practical solutions for everyday security and operational issues

M-Explorer is not a theoretical product. It is designed for real operational and organizational situations that occur daily in most enterprise environments.

“What happened to the system last night?”

In the morning the system behaves differently: a service fails, performance degrades, or something feels off — but the cause is unclear.

M-Explorer shows the latest changes: who changed what, when it happened, and after which state the system behavior diverged.

“Someone touched it — but who?”

A configuration or dataset has changed, but no clear owner can be identified.

The audit log records the user, timestamp, IP address and action. The log itself cannot be modified from the interface.

“Allow it — but only with rules”

Some changes are necessary, but not for everyone and not without constraints.

M-Explorer allows predefined actions bound to roles, without unrestricted or free-form editing.

“This is still a test — it must not become a production issue”

A new setting or workflow needs to be tried, but the organization cannot afford a live incident.

Segregated areas, confirmation-required actions and logging support safe experimentation.

“We are preparing for an audit or inspection”

During regulatory, internal or external audits, system behavior must be demonstrable.

M-Explorer provides structured event logs that are time-searchable and defensible.

“No more ‘I’ll just fix it quickly’”

A fast, undocumented change can cause outages lasting hours or even days.

The system prevents direct uploads or uncontrolled file modifications in critical areas.

“Are we sure the software itself wasn’t modified?”

The question arises whether an issue was caused by external factors or source-level modification.

Integrity monitoring alerts when the system deviates from a known, trusted baseline state.

M-Explorer does not make operations faster — it makes them predictable, traceable and safe.

What M-Explorer does NOT do

M-Explorer is designed for secure, controlled and auditable operation. For this reason, there are things the system intentionally does not do.

No unrestricted file operations

M-Explorer is not a general-purpose file manager. It does not allow unrestricted uploads, deletions or modifications in user-accessible directories without prior control.

No direct server access

The system does not replace SSH, FTP or administrative server-level access. Its operation is deliberately separated from infrastructure control.

No bypassing security rules

M-Explorer does not allow disabling protection mechanisms during runtime — not even at administrative request.

Not a “boxed” SaaS product

The system is not an instantly usable cloud service. Deployment, configuration and operation require technical coordination.

No irreversible actions without logging

Every significant operation is logged and traceable. The system does not support silent, non-auditable changes.

Not built for “quick hacking”

If the goal is immediate, uncontrolled modification, M-Explorer is not the right tool. The focus is on stability and reducing business risk.

These limitations are not shortcomings, but deliberate design decisions. M-Explorer is strongest where security and control are primary concerns.

Typical misunderstandings

These points are here to make sure everyone is talking about the same thing. It is perfectly fine to assume something else at first — it is better to clarify now than to argue later.

“Is this just a simple file manager?”

No. M-Explorer is not a general-purpose file manager, but a system designed for controlled and logged operation. The goal is safe operation — not unrestricted “edit anything anytime” access.

“So a colleague can just step in and edit if needed.”

That is exactly what we want to avoid. The system does not provide free-form access to source code or critical files, because this introduces stability and security risks.

“If something breaks, we’ll just disable the protection.”

That is not the model. Protective mechanisms exist to keep the system reliable. If help is needed, we assist — but not by bypassing safeguards.

“This is a cloud/SaaS product — we just log in and use it.”

No. M-Explorer typically operates as an on-premises installation. Consultation, deployment and configuration are required to properly fit the environment.

“Logging is optional.”

Logging is part of the core operation. The system is valuable precisely because it is traceable — who did what and when — protecting both operations and the business.

“If something goes wrong, it must be a software bug.”

In reality, issues are often caused by the environment, permissions or manual intervention. That is why control and audit exist: to quickly identify the cause instead of guessing.

The goal is to avoid “this is not what I expected” after deployment. If any of these points raise questions, it is best to clarify them before installation.

When M-Explorer is not the right choice

M-Explorer is a good fit when control, logging and stable operation matter. If any of the following apply, it is likely not the appropriate solution.

Not recommended if…

  • the goal is “quick fixes”, manual tweaking and rule-free modification
  • there is no designated person responsible for operation
  • auditability is not required
  • the environment changes too rapidly to allow proper coordination
  • the expectation is a boxed, instantly usable SaaS product

A better alternative might be…

  • a simpler admin tool or panel if there is no compliance requirement
  • a cloud service when on-prem deployment is not possible
  • custom development if processes are fully unique and cannot be standardized

If any of these apply, we prefer to say it upfront — this way, neither side wastes time.

Plans and licensing

M-Explorer is a licensed enterprise software delivered in a product + service model. The prices below refer to the software license fee only.

Important: assessment, planning and deployment costs are not included in the license fee. These items depend on the customer environment and requirements and are always defined in advance. There are no hidden costs.

Showcase

Free
demonstration mode

Public demo and documentation access. This plan does not include a production-ready installation.

  • Read-only demo environment
  • Vault and audit model demonstration
  • Permission structure overview
  • Runs on demo data
  • No uploads or modifications
Ideal for management presentations and internal decision-making.

Start

290,000 HUF / year 29,000 HUF / month
€ / year · ≈ € / month *

Entry-level enterprise usage with controlled document and configuration management.

  • File and configuration management
  • Document Vault
  • Basic audit logging
  • Role-based access control
  • Integrity monitoring
Annual license: assessment and planning included, discounted deployment.
Monthly license: assessment and deployment billed separately.
Request an offer

Enterprise

Custom pricing
based on assessment

For large-scale, regulated and audited enterprise environments.

  • Full feature set
  • Custom security and audit rule sets
  • Integrations and workflows
  • SLA and support options
  • Offline emergency backup (optional)
The full scope and boundaries of the Enterprise plan are documented in advance — no ambiguity, no surprises.
Contact us

Note: license fees apply to the use of the software only. Assessment, planning, deployment and custom integrations are not included and are always quoted separately.

* Prices shown in EUR are indicative and calculated using the current MNB EUR/HUF mid exchange rate. Contractual prices are always defined in HUF.

How the cooperation works

M-Explorer is not a “boxed” product. Deployment and operation follow a controlled and transparent process, ensuring clarity on both technical and business sides.

1

Initial contact and goal clarification

A short online discussion where we clarify:

  • how you intend to use M-Explorer
  • the target environment (on-prem / cloud / hybrid)
  • business, security and compliance expectations

Goal: decide whether M-Explorer is the right solution for the problem.

2

Environment assessment and planning

We review the technical setup and permission model:

  • server / VM / VPS parameters
  • relevant directories and data sources
  • users, roles and audit requirements

The outcome is a clear deployment and configuration plan.

3

Proposal and scope definition

Based on the assessment, we prepare a proposal that clearly defines:

  • the selected license
  • deployment and configuration details
  • what is included — and what is not

No “we’ll see later” and no hidden surprises.

4

Deployment and configuration

M-Explorer is installed in the agreed environment:

  • roles and permissions configuration
  • Vault and audit setup
  • integrity monitoring and base protection layers

The system is not put into production without validation.

5

Handover and onboarding

During handover we cover:

  • administrator fundamentals
  • typical usage patterns
  • operational and security recommendations

Goal: independent and secure usage from day one.

6

Operation and support

Ongoing work follows the selected SLA:

  • version updates
  • configuration changes
  • security and audit-related questions

M-Explorer is a long-term system, not a one-off project.

FAQ

Cloud or on-prem?

M-Explorer is typically deployed on-premises. Data remains within the company environment, with controlled access and operations.

How long does deployment take?

Deployment time depends on the complexity of the environment. The priority is always stable operation with permissions and rules aligned to real workflows.

What happens if an integrity deviation is detected?

The system issues a warning. In such cases, restoring the last known stable state is recommended. Remote assistance is available if needed.

What does the system log?

Key operations and system events are logged in a way that allows later review of what happened, when and in what context — supporting fast troubleshooting and audits.

Is permission management supported?

Yes. Role-based access is recommended, with separate administrator and operator permission levels. This reduces the risk of accidental or unauthorized changes.

How can support be requested?

Via the built-in Helpdesk module or by e-mail. The goal is fast diagnosis, controlled recovery and preventive guidance.

Didn’t find your answer? Jump to the Helpdesk section.

Next step

If you would like to see how M-Explorer can be integrated into your environment, let’s schedule a short technical consultation. The goal is to clarify requirements, environment specifics and possible deployment steps.

What can be automated?
We review processes and identify where rules and control make sense.
Deployment recommendation
Suggested environment, permissions, backups and logging — clearly explained.
Next steps
A clear plan: what goes live first and what can follow later.

What to send in advance (optional)

  • brief description of the environment (hosting, users, affected directories)
  • intended use cases (e.g. controlled uploads / logging / integrity alerts)
  • any specific security or compliance requirements

Contact

Contact us and we will respond within 1–2 business days with the details of the consultation.

Request technical consultation

info@hungarianhosting.hu