First Steps¶
Now that you have installed Faraday, let's walk through the essential steps to get you up and running.
1. Access the Web UI¶
Open your browser and navigate to your Faraday instance:
| Installation Method | Default URL |
|---|---|
| Docker Compose | http://localhost:5985 |
| Bare-metal (Linux packages) | http://localhost:5985 |
| SaaS | Check your inbox for the link |
Log in with the credentials generated during installation.

Forgot your credentials?
- Docker: Check the server logs for the auto-generated password:
docker compose logs faraday-server | grep "Admin password" - Bare-metal: Credentials were displayed when you ran
faraday-manage initdb. - Reset password: Run
faraday-manage change-passwordand enter the usernamefaraday. - See the FAQ for more details.
Change the default password
After your first login, change the default admin password immediately. Navigate to Preferences > Account or use:
faraday-manage change-password
2. Create a Workspace¶
Faraday organizes all your security data into Workspaces. Each workspace represents a scope of work — a penetration test engagement, a regular scan cycle, an application assessment, or any logical grouping of assets and findings.
To create your first workspace:
- Click the Faraday logo in the top-left corner
- In the Workspaces tab, click + Add Workspace
- Fill in the details:
- Name — A short, descriptive name (e.g.,
external-pentest-q1) - Start/End Dates — Optional engagement dates
- Description — Context about the scope
- Name — A short, descriptive name (e.g.,
- Click Create
Workspace limits
The number of active workspaces depends on your license type. Read-only workspaces are unlimited. See Workspaces for more details on managing, archiving, and sharing workspaces.
3. Import Scan Data¶
The fastest way to populate your workspace is to import results from security tools you already use. Faraday supports 120+ tools including Nmap, Nessus, Burp Suite, OWASP ZAP, Nuclei, and many more.
Option A: Upload a Report File (Web UI)¶
- Open your workspace
- Go to Vulnerabilities
- Click + Add Vulnerability
- Click Import from file
- Browse or drag-and-drop your report file (XML, JSON, CSV, or HTML depending on the tool)
- Click Upload
- Refresh the view to see imported findings
Faraday automatically detects the tool format and parses hosts, services, and vulnerabilities from the report.
Option B: Use the Faraday CLI¶
The Faraday CLI lets you import reports and run tools directly from your terminal:
# Install the CLI
pip3 install faraday-cli
# Authenticate with your Faraday server
faraday-cli auth
# Select your workspace
faraday-cli workspace select external-pentest-q1
# Import an Nmap report
faraday-cli report /path/to/nmap-scan.xml
# Or run a tool and auto-import results
faraday-cli tool run "nmap -sV -oX /tmp/nmap.xml 192.168.1.0/24"
Option C: Use Faraday Agents (Automated Scanning)¶
For recurring or automated scans, set up Faraday Agents. Agents run executors (Nmap, Nessus, Nuclei, etc.) on remote machines and push results directly into Faraday.
See the Agent Getting Started Guide for setup instructions.
Option D: Use the API¶
Faraday's REST API allows programmatic data import. Upload reports or create findings directly:
# Upload a report via API
curl -X POST "http://localhost:5985/_api/v3/ws/external-pentest-q1/upload_report" \
-H "Authorization: Token <your-api-token>" \
-F "file=@/path/to/report.xml"
See API Token for how to generate your token, and the API Reference for the full endpoint list.
4. Explore Your Results¶
Once data is imported, Faraday provides several views to analyze your findings:
Assets¶
Navigate to Assets to see all discovered hosts. Asset table includes these main fields for each asset:
- IP address and hostnames
- Open ports and detected services
- Associated vulnerability count
- Asset importance and risk score
- Graphical summary of important vulnerabilities of each asset
Services¶
Navigate to Services to see all discovered services in the discovered hosts. Each service shows:
- Service name and service port
- Service protocol
- Service status (open/close)
- Associated vulnerability count
- Associated Asset
Vulnerabilities¶
Navigate to Vulnerabilities for a consolidated view of all findings across your workspace. Main attributes for each vulnerability include:
- Name
- Severity
- Description
- CVE list
- CVSS score and vector
- Risk score
- Vulnerability status trace
- Associated Asset
- Custom Attributes
For any of these views Vulnerabilities, Assets or Services you can:
- Filter by any field (i.e. severity, status, tool, host, importance, custom attributes, etc)
- Sort by any column
- Customize columns using the column editor (top-right)
- Bulk update status (open, closed, re-opened, risk-accepted) or any other field.
Dashboard¶
Navigate to Dashboard for visual summaries:
- Vulnerability count by severity
- Top vulnerable hosts
- Findings over time
- Scan coverage statistics
5. Create Findings Manually¶
You can also create vulnerabilities by hand — useful for manual penetration testing findings:
- Navigate to Vulnerabilities
- Click + Add Vulnerability → Manual Creation
- Fill in the details:
- Target asset — Select an existing host (or create a new one first, in the Assets view).
- Vulnerability name — Choose from the built-in Vulnerability KB or enter a custom name
- Severity — Critical, High, Medium, Low, or Informational
- Description, resolution, references — Add context for remediation
- Click Create
Next Steps¶
Now that you have your first workspace populated with findings, explore these features:
| Feature | Description | Guide |
|---|---|---|
| Reports | Generate executive or technical PDF reports | Reports |
| Integrations | Push findings to Jira, GitLab, ServiceNow | Integrations |
| Notifications | Get alerts on new findings via Slack or email | Notifications |
| Planner | Organize remediation tasks | Planner |
| Custom Attributes | Add custom fields to vulnerabilities | Custom Attributes |
| Agents | Automate recurring scans | Agents |
| Faraday CLI | Command-line workflow integration | CLI Docs |
| API | Programmatic access to all Faraday data | API Reference |