This guide explains how to use the Linux Patch Monitor dashboard and features.
- Open your web browser and navigate to the Patch Monitor URL
- Enter your username and password
- Click "Sign In"
Default credentials:
- Username:
admin - Password:
admin123
Important: Change the default password immediately after first login.
The dashboard provides a comprehensive view of your Linux hosts and their patch status.
The dashboard displays four key metrics:
- Total Hosts: Number of monitored hosts
- Healthy Hosts: Hosts with no pending updates
- Security Patches: Total pending security updates
- Reboot Required: Hosts needing a reboot
Each host is color-coded based on its status:
- 🟢 Green (Healthy): Fully patched, no pending updates
- 🟡 Yellow (Updates Pending): Has non-security updates available
- 🟠 Orange (Stale): Hasn't been patched in 30+ days
- 🔴 Red (Security Updates): Has pending security updates
- ⚫ Gray (Offline/Error): Host is unreachable or has errors
The dashboard includes two charts:
- Host Status Distribution: Pie chart showing the breakdown of host statuses
- Patch Lag Distribution: Bar chart showing how long hosts have been unpatched
- Dashboard View: See all hosts in a grid layout with key information
- Host Detail View: Click on any host to see detailed information
The host detail page provides comprehensive information about a specific host:
- Operating system and version
- Architecture
- Agent version
- IP addresses
- Last collection time
- Last patch date and time
- Days since last patch
- Pending updates count (total and security)
- Reboot requirement status
- Package name
- Current version
- Available version
- Update type (security/regular)
- Associated CVEs (if available)
- Timeline of recent patch events
- Collection history
- System changes
Use the search and filter options to find specific hosts:
- Search: Type hostname or IP address
- Status Filter: Filter by host status (Online, Offline, Error)
- OS Filter: Filter by operating system (Ubuntu, Debian, RHEL, etc.)
The compliance report shows:
- Overall compliance percentage
- Hosts by compliance status
- Vulnerability summary by severity
- Historical trends
The vulnerability report displays:
- Total CVEs across all hosts
- CVE breakdown by severity
- Affected hosts count
- Security update priorities
Reports can be exported in multiple formats:
- PDF: Formatted, print-ready reports
- CSV: Raw data for analysis
- JSON: API-friendly format
The system generates alerts for:
- Patch Lag: Hosts not patched in X days
- Critical CVE: Hosts with critical security updates
- Offline: Hosts that haven't reported in
- Reboot Required: Hosts needing a reboot
- View Alerts: Check the alerts section for active alerts
- Acknowledge: Mark alerts as acknowledged
- Configure: Set alert thresholds and notification channels
- Application name
- Collection interval
- Data retention period
- Timezone configuration
- Create new users
- Assign roles (Admin, Operator, Viewer)
- Manage permissions
- Enable/disable accounts
- Email notification settings
- Alert thresholds
- Notification channels
- Quiet periods
- Session timeout
- Password policies
- MFA configuration
- API security settings
- Full system access
- User management
- System configuration
- All host operations
- View all data
- Acknowledge alerts
- Add notes to hosts
- Export reports
- Read-only access
- View dashboards and reports
- No modification permissions
- Regular Review: Check the dashboard daily for new alerts
- Prioritize Security: Address security updates immediately
- Maintenance Windows: Plan patching during appropriate times
- Documentation: Use notes to track maintenance activities
- Set Appropriate Thresholds: Configure alerts based on your policies
- Regular Acknowledgment: Keep alerts up to date
- Escalation Procedures: Define who handles different alert types
- Review and Tune: Regularly review alert effectiveness
- Consistent Naming: Use consistent hostname conventions
- Grouping: Use tags to group related hosts
- Documentation: Add notes for special configurations
- Regular Updates: Keep agent software updated
- Check if agent is installed and running
- Verify network connectivity
- Check agent logs for errors
- Confirm authentication token
- Verify agent is collecting data correctly
- Check package manager configuration
- Review agent logs for collection errors
- Test manual data collection
- Check browser console for errors
- Verify backend API is running
- Check network connectivity
- Clear browser cache
- Verify alert configuration
- Check notification settings
- Review alert thresholds
- Test alert generation
- Check Logs: Review system logs for error messages
- Documentation: Consult this guide and API documentation
- Support: Contact your system administrator
- Community: Check project documentation and forums
Ctrl + R: Refresh dashboardCtrl + F: Focus search boxEsc: Close modals/dialogsEnter: Submit formsTab: Navigate between elements
The dashboard is responsive and works on mobile devices:
- Dashboard: Optimized for mobile viewing
- Host Cards: Touch-friendly interface
- Reports: Responsive charts and tables
- Settings: Mobile-optimized forms
For advanced users, the system provides a REST API:
- Documentation: Available at
/api/docs - Authentication: Bearer token required
- Rate Limiting: 100 requests per minute
- Examples: See API documentation for usage examples
- Host Data: Retained for 90 days by default
- Snapshots: Compressed after 7 days
- Logs: Retained for 30 days
- Alerts: Retained for 90 days
- Access Control: Use strong passwords and MFA
- Network Security: Restrict access to monitoring server
- Data Protection: Encrypt sensitive data
- Regular Updates: Keep all components updated
- Audit Logging: Monitor user activities
- Pagination: Use pagination for large host lists
- Filtering: Use filters to reduce data load
- Refresh Rate: Adjust auto-refresh based on needs
- Browser: Use modern browsers for best performance
- Network: Ensure stable network connection