Products
Folder Manager
Features
8 min
activate folder manager provides a streamlined way to manage security and access to sensitive information stored within organisational file systems it continuously scans existing folder structures and permissions, capturing them in the activate database for reporting, visibility, and control rather than assigning users directly to folders, activate manages access through active directory security groups when new folders are created, activate automatically provisions the corresponding groups in predefined organisational units, applying consistent naming conventions and access rules users are then added to these groups to grant access as required managed file systems activate folder manager ensures file systems are managed in a consistent, secure, and policy compliant manner corporate standards are automatically applied during folder creation, modification, and access assignment, reducing the risk of configuration drift and manual errors scanning and discovery activate includes a high performance scanning engine that regularly analyses file shares, folder structures, and associated permissions it can process thousands of folders per minute across both local and remote systems, making deployment efficient across large environments compatibility the product uses the industry standard smb/cifs protocol to communicate with file servers any platform that supports this protocol can be scanned, including san, nas, and windows based environments such as hp, emc, and netapp business ownership and approvals each folder in activate can have one or more designated business owners responsible for approving and managing access requests business owners are assigned during implementation, either via csv import or using activate studio tasks bulk management users can add multiple users at once through the activate web portal or import them from a csv file, making large scale access management quick and efficient temporary access and expiry access to folders can be granted for a specific time period, ideal for contractors or temporary assignments users are notified seven days before expiry and can request an extension if needed if not renewed, access is automatically revoked, maintaining security and compliance creating secured folders activate simplifies the creation of secured folders by using templates that automatically generate both the folder and its associated active directory groups this ensures folders are created consistently, with the correct structure and permissions applied every time security and compliance shared file systems often contain sensitive or private information, yet visibility into who has access is limited activate folder manager resolves this by providing business users with a clear view of access rights, allowing them to manage access directly without it assistance auditing and reporting activate delivers complete audit trails across all folder management processes — from request through approval to implementation — ensuring traceability and compliance across all connected platforms workflow and approvals built in workflows provide reminders, escalations, and delegated approvals, allowing users to request, approve, and monitor folder access in real time end user experience activate folder manager is designed for ease of use from the activate web portal, users can browse and search available shared folders view current access options such as read or write permissions submit access requests without needing technical knowledge of active directory create new shared folders automatically secured by the system grant temporary access when required view and manage who currently has access to their data advanced feature re secure folder this optional feature replaces all existing security on a folder with new active directory groups while preserving appropriate user access it is typically implemented in advanced configurations or phased deployments activate folder manager transforms shared folder administration into a transparent, automated, and policy driven process, reducing it workload while maintaining control, security, and compliance