Prerequisites
- OpenWatch running with all containers healthy. See the Installation guide if you have not deployed yet.
- A Linux host reachable via SSH from the OpenWatch server (RHEL 8/9, Rocky, or Alma).
- SSH credentials for that host (username + password, or SSH key).
Step 1: Verify the deployment
Confirm the backend is healthy:Step 2: Log in
Open http://localhost:3000 in your browser. Enter the default credentials:| Field | Value |
|---|---|
| Username | admin |
| Password | admin |
Step 3: Add a host
From the left sidebar, navigate to Hosts. Click Add Host. Fill in the host details:| Field | Example Value |
|---|---|
| Hostname | web-01 |
| IP Address | 192.168.1.10 |
| SSH Port | 22 |
| Display Name | Web Server 01 (optional) |
| Operating System | RHEL 9 (optional) |
Step 4: Configure SSH credentials
On the host detail page, navigate to the Credentials section.| Method | When to use |
|---|---|
| SSH Key (recommended) | Paste the private key. Stored encrypted with AES-256-GCM. |
| Password | Enter the SSH password. Stored encrypted. |
| System Default | Uses the credential configured in Settings > System Credentials. |
Step 5: Run a compliance scan
From the host detail page, click Run Scan. Select a compliance framework:| Framework | Rules | Best for |
|---|---|---|
| CIS RHEL 9 v2.0.0 | 271 | Industry-standard hardening benchmarks |
| STIG RHEL 9 V2R7 | 338 | DoD and government environments |
| NIST 800-53 R5 | 87 | Federal information systems |
| PCI-DSS v4.0 | 45 | Payment card environments |
| FedRAMP Moderate | 87 | Cloud services for government |
Step 6: View scan results
Once the scan completes, the host detail page shows:- Compliance score — percentage of rules passing (e.g., 72.2%)
- Pass / Fail / Error counts — summary by status
- Findings table — each rule with its status, severity, title, and detail
- Severity breakdown — critical, high, medium, low counts
Step 7: Review the compliance dashboard
Navigate to the Dashboard from the left sidebar. The dashboard shows:- Aggregate compliance posture across all hosts
- Host list with last scan status and compliance scores
- Trend data showing compliance score over time
- Active alerts for compliance drift and threshold violations
Next steps
Hosts & remediation
Add more hosts, organize into groups, and fix findings.
Scanning & compliance
Understand posture scores, drift, and alerts.
User roles
Set up team access with role-based permissions.
API guide
Automate scanning via the REST API.
Changelog
See what changed in each release.
Troubleshooting
Cannot reach http://localhost:3000
Cannot reach http://localhost:3000
Frontend container may not be running. Check
docker ps | grep openwatch-frontend and docker logs openwatch-frontend.Connection refused on health check
Connection refused on health check
Backend is not running. Check
docker ps and docker logs openwatch-backend.Login fails with default credentials
Login fails with default credentials
Verify the backend started successfully. Check
docker logs openwatch-backend for initialization errors.Scan stuck in queued
Scan stuck in queued
The Celery worker may be down. Verify with
docker ps | grep openwatch-worker and confirm Redis is up: docker exec openwatch-redis redis-cli ping (expect PONG).Scan fails immediately
Scan fails immediately
Check the error on the scan results page. Common causes: SSH connection failure (wrong credentials or network), unsupported OS on target, or Kensa rules not loaded (
KENSA_RULES_PATH not set).