MatrixIT
×
actifile

Post-Installation Review & Training

Scan Results, Dashboard Walkthrough & Next Phases
Meeting 3 of 3 — Review

Prepared by MatrixIT.net

Client: ____________________  Date: ____________________

Meeting Objective

Why We’re Here

The Actifile agent has been deployed and the first scan is complete. In this meeting we will:

1
Kickoff
Complete
2
Discovery
Complete
3
Deploy
Complete
4
First Scan
Complete
5
Review
Today

Actifile Lifecycle – You Are Here

1

Deploy

Agents installed, tenant configured

2

Identify

Scan, classify, map sensitive data

You are here
3

Protect

Encryption, rules, allowlisting

4

Monitor

Alerts, risk tracking, compliance

Scan Results Summary

The first scan has completed across your environment. Below are the key metrics. (MatrixIT will fill in actual values during this meeting.)

___
Devices Scanned
___
Files Analyzed
___
Sensitive Files Found
$___
Data Risk Value
Actifile Dashboard – Risk Overview with KPIs and risk by category

Actifile Dashboard – Risk Overview (illustrative; actual values populated during meeting)

What Do These Numbers Mean?

Data Risk Value: Actifile quantifies risk in dollars — the potential financial exposure if sensitive data is breached. This considers the volume, type, and classification of sensitive data found.

Risk values can change as new files are created, modified, or scanned. Actifile continuously monitors and recalculates.

Data Classification Breakdown

Actifile classifies sensitive data using multiple classifier types. Below is a summary of what was found:

Classification Breakdown by Type – Content, Extension, Folder, Application, Compound

Classification Breakdown – By Classifier Type

Device Scan Progress – showing scan % and online/offline status per device

Device View – Scan Progress per Machine

Dashboard Training

We will walk through the Actifile portal together. Key areas to cover:

Portal Navigation

my.actifile.com — Partner/MSP management portal (tenant management, add customers, deployment settings)
app.actifile.com — Application portal (dashboard, devices, scan results, policies, reports)

1

Dashboard Overview

Risk summary, sensitive data count, device status, recent activity

2

Devices Tab

View all deployed agents, scan progress %, online/offline status, last check-in

3

Sensitive Data View

Browse classified files, filter by type, view details and risk per file

4

Check Agent Status

Confirm agents are running, identify offline/stale agents, troubleshoot

5

Risk Values

Understand risk scoring: dollar value, severity levels, what causes changes

6

Alerts & Notifications

Set up email alerts for sensitive file operations and upload spikes

7

Right-Click Menu (Windows)

Actifile shell extensions: scan file, view classification, encrypt/decrypt

8

Content Detector

Inspect detected sensitive data in files; locate specific PII/financial details

Alert Configuration – toggle switches for sensitive file operations, upload spikes, agent offline

Actifile Portal – Alert Configuration

Phases: Identify → Protect → Monitor

Current Phase

Identify

Review and tune what Actifile found.

  • Classifiers: content, compound, extension, folder, application, storage platform
  • Template classifiers available out-of-the-box
  • Custom classifiers can be created for unique data types
  • Review forms, scanned docs, and corrupted files handling
  • Flag false positives and adjust sensitivity

Protect

Enable data protection after monitoring period.

  • Data protection actions (formerly rules)
  • Invisible file-level encryption
  • Application allowlisting — must configure before enabling encryption
  • Encryption best practices & wizard
  • FIPS 140-2 compliance option
  • Recommended: 1–3 months monitoring before enabling
Ongoing

Monitor

Continuous auditing and alerting.

  • Alerts for sensitive file operations
  • Upload spike detection
  • Agent status monitoring
  • Risk value tracking over time
  • Compliance reporting
  • Monthly review cadence (recommended)

Encryption Timeline

Actifile recommends running in monitoring mode for 1–3 months before turning on encryption. During this period, you identify which applications, websites, and users need access to sensitive files. This prevents disruption when encryption is enabled. The period can be shortened to a few days if needed.

Classifier Types Reference

ContentDetects data patterns inside files (SSN, credit card numbers, etc.)
CompoundCombines multiple classifiers with AND/OR logic
ExtensionClassifies by file type (.xlsx, .pdf, .docx, etc.)
FolderClassifies all files in specific folder paths
ApplicationClassifies files created/used by specific applications
Storage PlatformClassifies by storage location (local, cloud, NAS)

Next Steps

Client Actions

  • Review scan results in the portal over the next 1–2 weeks
  • Flag any false positives or unexpected classifications
  • Identify applications that access sensitive files (for future allowlisting)
  • Approve classifier tuning or request custom classifiers
  • Set up individual alert preferences (email notifications)
  • Report any agent issues or performance concerns

MatrixIT Actions

  • Adjust classifiers based on client feedback and false positives
  • Create custom classifiers if needed for unique data types
  • Monitor ongoing scan results and risk scores
  • Prepare application allowlisting plan for encryption phase
  • Schedule monthly review check-in (recommended)
  • Plan encryption enablement meeting (after 1–3 month monitoring period)

Recommended Ongoing Cadence

Monthly: MatrixIT reviews dashboard, risk trends, and agent health. Short check-in call with client.
Quarterly: Deeper review of classifiers, policy changes, and encryption readiness.
After monitoring period: Dedicated meeting to enable encryption with application allowlisting configured.

Contacts & Support

MatrixIT

Email: proservices@matrixit.net

Phone: (613) 232-0648

Web: matrixit.net

Actifile Support

Support: support.actifile.com

Portal: app.actifile.com

Knowledge base: KB articles

Troubleshooting: Agent guide