Securing Onity Systems: Troubleshooting and Solutions