Need Help?

Check out our frequently asked questions, videos, and knowledge base.

FAQs
Knowledge Base
Videos
 
Search

Frequently Asked Questions

Administrator

How do I create my Unify account and on-board my users and devices?


Getting setup with Entreda Unify is a two-step process. 1) Create your Unify account. You will receive an email from Entreda with steps on how to begin the account creation process once you sign up with our services. If you haven't received the email, contact your administrator or support@entreda.com. 2) Enroll your device. Install the Unify applet on the devices you want to monitor. Detailed instructions on how to get setup with Entreda Unify can be found below: For Administrators click here. For Users click here. For mobile devices click here.




How do I access cybersecurity compliance reports on Unify?


We have two core reports that represent various compliance items for cybersecurity.

1) Security Standards Checklist Report: This report is sent to all users and answers several compliance questions with a "Yes" or a "No."

2) IT Activity Report: These reports are sent to Unify account administrators and give detailed information on non-compliances and other cybersecurity items that are tailored directly to SEC/FINRA cyber guidelines.

To learn more about how to access these reports on Unify, watch the video below.

.




I have auto-update enabled, why do my reports show that I have pending patches?


If auto-update is enabled on your device, it will only apply "Critical" patches automatically, not "Optional" patches. Under the IT Activity Report, any pending critical updates will be noted under the "Not so Good" section. If the patches are in the general section, these are "Optional" updates and not critical to install.

NOTE: If you only have "Optional" patches pending, this has no negative audit effect for audit trail purposes.




I already use Norton anti-virus. Will I need to remove that and if so, which anti-virus software do you use?


No, we work with all commercial anti-virus software solutions in the market. We act as a security overlay to ensure that the ant-virus is a "white-listed" app (which it is), monitor if the A/V software is running and up-to-date at all times etc. If a new device is registered and it has NO anti-virus software on it that the app can detect, then we automatically install our A/V solution to ensure that the device is in compliance with your firm’s cyber policy.




How do we detect a proprietary application if it’s named something other than Box, Dropbox etc?


In the Unify applet software, we have the ability to detect any (mounted) file-sharing app. All file-sharing app leave remnants on the end-point device which the Unify applet is able to detect and flag as part of our data leakage monitoring capability.





Users

Is Whole Disk Encryption required?


Mobile devices such as tablets, phones, notebooks, and laptops must have their drives encrypted. For desktop devices (and servers), disk encryption is not required but is good to have to ensure your devices are secure.




How do I encrypt my drive?


Encrypting your device is an important item of compliance per SEC/FINRA guidelines. A "Fail" for encryption means that we are detecting your device is not currently encrypted. We recommend you encrypt your device in order to turn your "Fail" to a "Pass."

Need help encrypting your Windows device? Click here.

NOTE: BitLocker is builtin for Business grade Operating System version of Windows only (i.e. Windows 10 Professional)

Need help encrypting your Mac device? Click here.




How does Entreda Unify determine if a device has a secure WiFi connection?


The Unify applet checks for a WPA2 encryption. If WPA2 encryption is used for WiFi connectivity and/or wired ethernet, this status check is categorized as a "Pass." If at any time Entreda Unify determines that any other connection is being used, it will flag this as a "Fail" and specify the networks name (WiFi SSID) and the reason for the failure. Entreda Unify programmatically interfaces with the underlying operating system (Windows or Mac OSX) and continuously monitors the device's local area network interfaces (WiFi and wired ethernet). Examples of "Failing" WiFi networks include those that are encrypted with WPA+AES, WPA+TKIP, and WEP.

If the device has the Entreda Unify VPN service, when Entreda Unify detects that an unsecured WiFi network is used, the device user will be prompted to enable a secure encrypted tunnel (VPN) for their browsing/internet access. This auto-remediation feature is not enabled by default.




How do I setup VPN?


For how to set up VPN on your device, click here.




I have a password on my computer but I am still getting a "Fail" on my Unify Portal. How do I fix this?


You can either manually place a password policy on your device or use Unify's built-in auto-remediation process to place a compliant device password policy.




My reports say I am failing but I have these settings correctly set on my device.


When reports are generated, it takes a snapshot of the settings from the portal and puts them into the report (either Security Standards Checklist or IT Activity Report). If there is a "Fail" on the report, it is likely that when the report was created, there was a non-compliance. For real-time status of your cybersecurity settings, always check the Unify dashboard.




I have auto-update enabled, why do my reports show that I have pending patches?


If auto-update is enabled on your device, it will only apply "Critical" patches automatically, not "Optional" patches. Under the IT Activity Report, any pending critical updates will be noted under the "Not so Good" section. If the patches are in the general section, these are "Optional" updates and not critical to install.

NOTE: If you only have "Optional" patches pending, this has no negative audit effect for audit trail purposes.




How do I access cybersecurity compliance reports on Unify?


We have two core reports that represent various compliance items for cybersecurity.

1) Security Standards Checklist Report: This report is sent to all users and answers several compliance questions with a "Yes" or a "No."

2) IT Activity Report: These reports are sent to Unify account administrators and give detailed information on non-compliances and other cybersecurity items that are tailored directly to SEC/FINRA cyber guidelines.

To learn more about how to access these reports on Unify, watch the video below.

.




How do I create my Unify account and on-board my users and devices?


Getting setup with Entreda Unify is a two-step process. 1) Create your Unify account. You will receive an email from Entreda with steps on how to begin the account creation process once you sign up with our services. If you haven't received the email, contact your administrator or support@entreda.com. 2) Enroll your device. Install the Unify applet on the devices you want to monitor. Detailed instructions on how to get setup with Entreda Unify can be found below: For Administrators click here. For Users click here. For mobile devices click here.




I already use Norton anti-virus. Will I need to remove that and if so, which anti-virus software do you use?


No, we work with all commercial anti-virus software solutions in the market. We act as a security overlay to ensure that the ant-virus is a "white-listed" app (which it is), monitor if the A/V software is running and up-to-date at all times etc. If a new device is registered and it has NO anti-virus software on it that the app can detect, then we automatically install our A/V solution to ensure that the device is in compliance with your firm’s cyber policy.




How do we detect a proprietary application if it’s named something other than Box, Dropbox etc?


In the Unify applet software, we have the ability to detect any (mounted) file-sharing app. All file-sharing app leave remnants on the end-point device which the Unify applet is able to detect and flag as part of our data leakage monitoring capability.





Getting Started

How do I create my Unify account and on-board my users and devices?


Getting setup with Entreda Unify is a two-step process. 1) Create your Unify account. You will receive an email from Entreda with steps on how to begin the account creation process once you sign up with our services. If you haven't received the email, contact your administrator or support@entreda.com. 2) Enroll your device. Install the Unify applet on the devices you want to monitor. Detailed instructions on how to get setup with Entreda Unify can be found below: For Administrators click here. For Users click here. For mobile devices click here.




How do I generate a cybersecurity policy?


To learn how to create your cybersecurity policy on Entreda Unify, watch the video below.




How do I read the reports sent to my email?


We have two core reports that represent various compliance items for cybersecurity.

1) Security Standards Checklist Report: This report is sent to all users and answers several compliance questions with a "Yes" or a "No."

2) IT Activity Report: These reports are sent to Unify account administrators and give detailed information on non-compliances and other cybersecurity items that are tailored directly to SEC/FINRA cyber guidelines.

To learn more about how to access these reports on Unify, watch the video below.

.





Support Tech Notes

I got prompted to change my Unify account password. Why does it keep prompting me to change it again?


In a few cases, some users have reported that when attempting to change their Unify password, the portal may prompt the user to change it again (in a loop). If this does happen to you, simply click on the Unify logo on the top left of the page and it will take you to the home page of the Unify dashboard. This will resolve this occurrence.




I submitted a manual exception for encryption why are my Unify reports still showing it as a “Fail”?


After placing a manual exception on the portal for any item there can be a delay in reflecting these changes on your weekly reports. If after 5 days you are still seeing a discrepancy from the portal (or reports), please immediately notify support@entreda.com .




While creating my Unify account the progress bar goes up to 67% then stops there, why is this happening and how do I resolve this?


In some cases, during the Unify account creation process, the user may not be able to proceed beyond 67% for more than 15 minutes. In these cases, the Unify account set-up likely did not get processed correctly. As a result, Entreda will have reset your account. Please reach out to support@entreda.com and we will reset your account for you.




Dell Data Protection Encryption (DDPE) is not detected?


Dell Data Protection Encryption has a unique way of reporting its status to the Windows Operating System. We have seen some cases where the Unify platform is unable to detect this Encryption software accurately. Entreda is currently working with Dell to improve detection capability to support this case. If you believe you have your device properly encrypted with Dell Data Protection Encryption software and the Unify applet is not detecting this as expected, please reach out to support@entreda.com.




I have Symantec anti-spyware enabled why I am getting a fail for anti-spyware?


We’ve spent a long time working directly with Symantec on this item. Symantec’s only detection capability currently includes delayed reporting for their anti-spyware to the native Windows Operating System. Once the device gets rebooted the reporting of anti-spyware for Symantec gets updated to both the native Windows Operating System as well as the Unify portal.




I have Trend Micro anti-virus enabled on my computer but the Unify reports say I don’t have Trend Micro enabled?


In rare cases when Trend Micro is managed centrally from a web console, an enabled Trend Micro anti-virus program can sometimes report as disabled.

If you believe this is the case for your machine, please send a screenshot of Trend Micro anti-virus enabled on your device to support@entreda.com




Why does my anti-spyware status show as a Fail but I have anti-spyware installed and enabled?


On MAC OS devices on occasion there is a delay in the reporting to the portal. If you have verified that you have anti-spyware enabled properly and are still seeing a Fail for anti-spyware please reach out to support@entreda.com




Why do I have multiple "VN's" showing up on my Windows 7 machine?


In some cases on Windows 7 machines if you utlize our VPN service you may see multiple "VN's" showing up on the bottom right of your screen. This will go away once you log off of your device.





General

How does Entreda Unify enforce the use of a strong password and aging policy?


The Entreda "Compute Device Password Policy" feature enforces a password policy for all of your devices (Windows PC and Mac OSX) automatically. This feature uses the existing user login on your device. Password policy enforcement includes complexity (strength), aging (expiration), and length.

The following are requirements for the password policy to be "Passing" (in accordance to SEC/FINRA guidelines):

1) Password complexity (or strength) must be high and contain at least three of the following elements:

Lowercase letter (a through z)

Uppercase letter (A through Z)

Number (0-9)

Symbol (#$%&, etc.)

2)Password Length has to have a minimum length (default is 8 characters)

3) Password Aging Policy: Password has to change periodically (at least every 90 days)

4) Password History Length: Has to be greater than or equal to 5. Need to ensure same password is not “recycled”

NOTE: We are unable to check the password itself. We monitor the policies which are set on the device.

The password policy can be changed by the system administrator and/or compliance enforcement organization. This auto-remediation feature is enabled by default and can be disabled through the Entreda Unify cloud console.

To learn more about passwords and password policy, click here.




I already have a compliance consultant. Why do I need Entreda?


Typically, what we see is that compliance consultants tend to be generalists. While, they can help your firm with generating cybersecurity policies and assisting with filings, with cybersecurity you need to dive deep into implementation in order to reconcile your actual practice against the policy of record. That’s where we come in. We work hand in hand with your compliance team to understand your existing policies and then we take it from there. We suggest some modifications to your policies and then continuously test your policies against actual implementation and provide weekly reconciliation reports that are appended to your cybersecurity policy. This way your firm is able to demonstrate proof of policy enforcement 24x7x365.




I already have an IT provider or MSP, do I still need Entreda?


Entreda Unify is designed to work in conjunction with IT provider solutions. Our solution should not conflict with other software agents used to monitor networks, end-points or applications. The primary purpose of the Entreda Unify app in this case would be to provide checks and balances (an independent 3rd party attestation) that your IT environment meets SEC/FINRA cybersecurity policies and provides real-time evidence reports to this effect. Additionally as a side benefit, Unify provides a firm-level dashboard and cybersecurity risk score which can help you visualize your firm's cybersecurity posture in a single place.




I am a small financial services firm or healthcare firm, is your solution overkill?


No. How do you currently enforce your cybersecurity policy? In other words, how do you test it? If you had a breach incident or an audit, how would you produce a report of all users connected to your network and their cybersecurity posture on that day? Essentially, how do you separate normal IT behavior from malicious ones for your user base? At Entreda we know that cybersecurity presents a persistent threat and a clear and present danger to your business . We take a forensics approach to a breach incident and apply it pro-actively. We are collecting all the evidence you would need to produce after the fact a priori because you can never be too prepared. Moreover, if you look at the SEC/FINRA/HIPAA or NYDFS guidance they recommended a long list of best practices that firms should employ and will be required to present during an audit. We have you covered there and more.




Can you see all of our private customer data?


Note that Entreda does not obtain any “actual” data. Only metadata is collected, which is data about data. In other words, there is no context and no personal information that Entreda has access to. What Entreda does obtain is information about your security settings. For example, Entreda knows if you have a password policy set, but obtains zero information about the actual password. Details of information gathered can be found in the Privacy Policy.




Cloud software could present security vulnerabilities. Is Entreda Unify software vulnerable? In other words, you’re watching us, but who’s watching you?


  • There are a number of ways to answer this question.
    • 1. The Unify platform deals with “meta data” (information about information) and not client data with PII (personally identifiable information). So, in other words we have the ability to detect password policies and not know the actual passwords. We have the ability to detect file changes into DropBox but NOT the contents of the file.
    • 2. We have implemented a layered security framework with our selective multi-tenant architecture. All accounts have dedicated instances and therefore, even if there is a breach event that AWS instance is shut down without it affecting the rest of the network. Each AWS instance sits behind multiple layers of firewalls and intrusion detection servers.
    • 3. We have implemented data-in-motion encryption standards. So, all data moving from the Unify applet to the cloud servers happens over an encrypted link using AES-256 bit. De-crypting these links and doing man-in-the-middle attacks would be prohibitively time consuming.




Does Entreda Unify include data loss prevention strategies and vendor management services?


Entreda Unify comes standard with data loss monitoring and 3rd party risk management as an optional add-on service. To learn more about our third party risk management, watch the video below.




Is it possible for Entreda to search our email system for key words?


We focus primarily on users, devices and networks - email is outside our purview we rely on partners like Smarsh, Global Relay, and AppRiver to handle that.




What type of encryption is used to secure the information that is being transferred offsite to Entreda?


All data in motion is encrypted, we use SSLv (AES-256 bit encryption). All of our infrastructure is protected behind multiple layers of firewalls.




How does Unify compare to Virtual Desktop Infrastructure (VDI)?


1. Our services are complimentary to VDI. Here’s why - VDI provides an “IT sandbox” with their managed service, so they will take care of everything within in their sandbox. Simply put, our focus is your IT environment outside of the sandbox. Even though your PII is likely to be in the VDI sandbox, you are still accessing it from an end-point (laptop, desktop or mobile device). Therefore, if your end-point is breached due to a phishing attack or your access network compromised, all bets are off. This is what we focus on. We ensure that all infrastructures outside of the VDI sandbox are protected and audit ready. So, irrespective of whether your IT environment is in a virtual desktop environment like VDI or not, you will still need to do end-point risk assessments, end-user security awareness training and simulated penetration testing. We can provide that with our services. 2. Mobile devices are a particular area of concern. It is important to make sure that you have mobile device security monitoring particularly with increased co-mingling of personal-use and business-use. 3. Another example is data leakage monitoring. A key area of emphasis by examiners recently, is making sure you have monitoring for data being taken out of the VDI sandbox and saved on USB drives, dropbox or any other filesharing app. While all employees won’t do this, the burden of proof to prove this is on the firm. Unify can help establish audit trail on this 4. Perhaps the most important point is the need to have an independent 3rd party attestation of your cybersecurity posture. By signing with us, we provide that attestation by continuous testing. VDI is an IT provider and therefore if they were to certify their cybersecurity position, it would be the “fox guarding the hen house”. We provide checks and balances that SEC, FINRA, HIPAA, and state-boards demand.




What is HIDS?


  • Servers are a high attack point from a cyber-threat perspective due to the valuable information and access they contain. Hackers exploit servers differently than standard endpoint devices, therefore, here’s what our Host-Based Intrusion Detection Service (HIDS) for servers supports:
    • 1) Detailed Log Analysis - We sift through a large database of syslogs. The goal is to detect attacks, misuse of servers or system errors using the logs.
    • 2) Syscheck - we check if any configured files are changes or any registry entries are changed (which generally dictates odd behavior/malicious activity)
    • 3) Rootkit checks - here we check for any rootkits that we find installed. (rootkits are types of software that can hide the fact that any Operating System has been compromised)
    • This is all monitored on a 24/7 basis and you are notified (in real-time) of any odd behavior via e-mail/the Unify portal.




What information does Entreda collect?


  • Here is some info about information we collect, depending on the settings enabled as part of the account set-up process, we may collect and either store locally or transmit to Entreda, certain information as described below:
    • General information such as operating system information, device hostname, device unique identifier (such as MAC address), IP address, software version, username and email address
    • Compute device (MAC OS X, Windows x86) information which includes: device disk encryption status, device client firewall status, antivirus status (installed/enabled), malware protection software status, network type device connects to along with link encryption status/network name (if applicable), applications installed, applications processes running, device user login password policy settings, screen-lock settings, operating system updates status (enabled/disabled) along with patches, drive monitoring (USB flash drive, cloud storage activity) which include files modifications, files creations, filescopy, and file name changes, remediation activity (whether a particular remediation was accepted or not); device connected status, Network Topology scans;
    • Mobile device (iOS, Android) information which includes: device disk encryption status, WIFI network name device connects to along with link encryption status (if applicable), Applications installed, device pass-code settings, device auto-lock settings, operating system updates status
    • Please note that Entreda does NOT have any access to PII. We only have access to meta-data (information about information) related to security configurations of your devices, networks and users. Most of the system is automated and we ONLY see the information and alerts related to security configurations.




Will Entreda Unify slow down my computers, laptops, etc?


The Entreda Unify applet is a lightweight application and should have no impact on the performance of your device, however, if a device is already experiencing performance issues (like insufficient memory, too many apps installed, etc.) then the Unify applet may throw the device over the edge (in terms of performance). In general, our recommendation is to follow our minimum guidelines when installing the applet and you should be fine.




Does Entreda see all applications installed on devices?


As part of regulatory guidelines, you are required to track applications installed on all “corporate devices” or personal devices deemed for “corporate use”. Unify tracks the names of the applications installed and the changes week to week. If we find any malicious applications installed such as peer-to-peer software, true crypt or any other apps that could increase your cybersecurity risk, Unify will alert the user and the administrator. We don’t have access to application data just the name of the application.




Will any of the software block spam coming in on our server?


Our software ensures that you have anti-spam or anti-malware software running on every device including server all the time. If we don't detect any, we send a notification to the administrator. Additionally, we also track new applications and/or processes running on every device. This way you are able to detect anything malicious running on the device continuously.




So, I have my own VPN infrastructure. Does your VPN app replace mine or integrate with it?


Our VPN app is an overlay to your existing corporate VPN network. We set up a second dedicated cloud hosted VPN gateway for your firm so when your users are traveling, we automatically set up an automatic VPN session between their end point devices and this Entreda managed cloud VPN gateway.




I already have a cyber security policy, what is it that you offer in this case?


We will review your existing cybersecurity policy and suggest any changes. Equally important to having a comprehensive cybersecurity policy is putting an enforcement plan in place. The Entreda Unify platform acts as the enforcer for most policies in the cybersecurity document.




All my data is in the cloud, do I need your product?


It is a common misnomer that if all your data is in the cloud, the end point device’s role in cyber security defense strategies is absolved. Many recent breaches have shown that through phishing attacks and key loggers one can easily exploit vulnerabilities in end-points and gain access to cloud accts. Therefore, it is extremely important to protect all end-point devices. Remember that security is a layered problem.




I have anti-virus and anti-malware. I am good, right?


Anti-virus, anti-malware, client firewalls are only part of the solution. To have a real monitoring solution, you need to perform behavioral analytics and active monitoring of devices. Unify does exactly that.




Over the last 30 years, this has not been an issue, why now?


There have many changes in the state of IT lately. 1. Increased use of mobile devices, cloud apps and overall dependence on technology. With increase use comes the natural problem of increased vulnerabilities. 2. Regulation changes including increased scrutiny of cyber security best practices. This is on top of all the compliance related activity that exists already. 3. More competition, less time. With more work and less resources, it is imperative to outsource non-core activities. IT and cybersecurity monitoring happens to be one of those activities.




If I have a printer issue, will you take care of it?


The Unify platform is meant to automate cybersecurity enforcement and compliance. If the printer is a vulnerable component of your overall cybersecurity plan, we will work to resolve it. We don’t trouble shoot printer connectivity issues.




Do you do vulnerability and penetration tests?


Yes. We perform vulnerability and penetration tests. This is an add-on service. Penetration tests are done on a quarterly basis. We will send you a report and go over our findings with you after each test.





Knowledge Base
For more guides, you can visit our knowledge base here.
Quick Start Videos
For support and feature videos, you can visit here.
Want more help? Press the support button on the right to submit a ticket.
  • Wix Facebook page
  • LinkedIn App Icon
  • Wix Twitter page
© 2021 Entreda, Inc. All rights reserved.