Skip to main content

Q: Why does the TruU app request Location Services permission for Wi‑Fi environment scanning used in risk evaluation?

A: The TruU app uses Wi-Fi environment signals as one of the inputs for risk checks. When enabled, it reads only limited Wi-Fi network metadata such as: 
  • Network name (SSID) and access point identifier (BSSID / Wi-Fi MAC address) 
  • Signal strength (RSSI), channel/frequency, link quality 
  • Network security protocol 
  • Network connection status 
These signals help the system understand typical network environments over time (for example, office vs. home vs. unknown networks). This allows the app to: 
  • Detect unusual or unfamiliar environments 
  • Contribute to risk assessments for access decisions 
The app does not inspect network traffic, read user files, or capture browsing activity. 

Q: What is a re-auth prompt and why does it happens?

A: It is a risk-driven security action based on the system’s real-time risk level. Note that number of re-auth prompts triggered per configured policy in admin console. It happens when current behavior-based risk crosses configured re-auth thresholds.
Image
Q: What happens when risk becomes high?
A: The system raises security posture and can require re-authentication according to configured policy.
A: When the user risk moves to high. TruU prompted to re-authenticate with valid pin or bio based on enrollment. This prevented using seamless SSO when their risk moves to high so that bad actors cannot perform actions on other user’s systems.  TruU observes the value for “real” risk. When the risk crosses the threshold per configured policy in admin console, the user is prompted to authenticate 
  • Face, if available 
  • Fingerprint, if available  
  • PIN 
If the user enters the incorrect PIN enough times to trigger PIN lock, the screen is locked and the PIN is locked out. The authentication prompt displays a message with the reason for the prompt   If the user does not authenticate, TruU will lock the user’s screen  The timeout to be configurable via registry, but with a The default countdown is 30 seconds.  Registry key: 
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\TruU\Authenticator 
Key name: ReauthTimeoutSec 
Default: 30 seconds   Effect: UiRestart required when changed  
Image
 Meaning: Countdown duration for the re-auth prompt; if user doesn’t re-auth in time, the workstation is locked. Max allowed is 120 seconds.  Send an event that the user was prompted for re-auth and the result of the auth   Q: Can risk go down after a prompt?
A: Yes. Risk is continuously reevaluated and may decrease as new trusted activity is observed.

Q: How often can prompts appear? What is the cool down period? 

A: As a user, I don’t want to get prompted too often to re-authenticate so that if Cauth is making a mistake on determining my risk level I am not spammed with re-auth prompts. Customer configurable setting for a Cauth re-auth cooldown: AuthCooldownSeconds Default value is 30 minutes (1800 seconds) When a user is prompted for re-auth, the cooldown period starts. They are not prompted for re-auth again during the cooldown period even if the risk changes to a value that should trigger the prompt If the cooldown period passes and the risk is above the threshold, the user is immediately prompted WA does not wait for a risk change, but instead checks the current risk value when the period ends Checklist 

Q: What does a Risk Change Event mean for a user session, and what triggers it?

A: Risk Change Events are generated when the system detects a change in the session’s re-authentication risk level (Real Risk).
Image
Image
Image

Q: What if re-authentication prompt was correctly triggered by policy, but the prompt timed out because the user took no action?

A: If the re-auth prompt times out because the user takes no action, the behavior is expected:
  • Outcome is treated as Timeout.
  • It records a failed auth event with message like “Re-authentication failed: timeout”.
  • Then it calls to lock the machine.
So this indicates user non-response to the prompt, not a potential high risk user
Image

Q: What happens if the user successfully verifies with a valid PIN or biometric after a policy-triggered re-authentication prompt?

A: When that happens, the flow is a successful re-authentication:
E3a3181d Afbb 479d 9d7e 3e2c09ee5e8e
  • Prompt is triggered because RealRisk >= policy threshold.
  • User completes verification with valid PIN/BIO.
  • Outcome is marked Success and a success auth event is recorded.
  • A cooldown starts (AuthCooldownSeconds) to suppress immediate repeat prompts.
  • Workstation is not locked.
Image

Q: What happens when a user enters an incorrect PIN during re-authentication if they have biometrics enrolled?

A: After policy re-auth, a bad PIN uses up attempts and can lock PIN entry for a cooldown, but with biometrics enrolled the user is expected to finish using fingerprint or face during that time; only if biometrics don’t succeed does the session fail and the workstation may be locked.
Image

Q: What does it indicate when a Continuous Authentication event is logged as Success with additional info ‘Re-authentication prompted due to high risk’? 

A: This event is triggered at the moment the re-auth flow starts and the final outcome (success/timeout/cancel/error) is logged afterward as separate auth events
Image

Q: What does the CAUTH_NO_KEYBOARD_MODEL_TRAINED event mean, and under what conditions is it generated?

This event means CAuth/TCAT was installed, but the keystroke model has not been trained/available yet.  TCAT model status can be Learning, Trained, or Unavailable. Operationally, when the keyboard model is missing, the scoring pipeline can’t produce a keyboard-based risk output. So, the event is essentially telling you: keyboard-based continuous-auth risk is not yet usable; it will start contributing once the “keyboard model … is now available / trained” event fires. 
Image

Q: What does the CAUTH_KEYBOARD_MODEL_INITIAL_TRAIN event indicate, and what changes after it is generated? 

Truu has finished training an updated keystroke behavior model (used for risk scoring during continuous authentication), and the system is now able to use that newly trained model for future authentication decisions. 
Image

Q: What is the local retention policy for Model Data in Windows?

Local data retention is enforced automatically by the endpoint DB cleaner using configured per-table policies (Over all 14-day default rule)

 Q: What is the role of the Archiver endpoint URL in the agent’s transmission of device-stored records to the cloud service?

A: The Archiver URL (Prod: https://arc.truu.ai) is the HTTPS endpoint where the TruU agent periodically uploads batched following records from the local database.  
  • CAuth model performance metrics 
  • CAuth models themselves 
  • Risk scores 
  • All peripherals are attached to machines (mice, monitors, etc.) 
  • All raw mouse movement information 
  • Keyboard embeddings and typing metadata 
It authenticates with a token using encrypted transport and only the specific records our software stores in its internal database.   Note: It does not read or upload arbitrary files from the device.   All archived data is anonymized, which means that it cannot simply attach any particular user identity to any piece of data. 

Q: Why is CAuth model status not visible in the Admin Console ? 

A: Future release part of Plat 26.204 Build Admin can view the column “model status” for the devices that are “trained“ and “unavailable” (when model is not trained due to not enough keystrokes supplied by user )