Frequently
Asked
Questions

Many of you recognize WeActis’s potential to enhance your data hygiene and minimize your attack surface. Here are the answers to the most frequently asked questions about how it operates, data privacy, deployment, user adoption, and ROI.

Data Privacy

No. WeActis uses only specific Microsoft 365 data to analyze collaboration behaviors and identify potential risks or necessary actions. For shared files, only metadata is collected; neither the files themselves nor their contents are ever accessed.

All components of WeActis and the collected data are hosted in Canada in various cloud environments, ensuring constant data availability and integrity.

WeActis stores data in highly secure environments, utilizing logical isolation to protect each organization’s data. Multiple levels of encryption are implemented, along with continuous access verification to ensure users only see information relevant to them. Detailed information about these mechanisms and controls is available upon request.

Application Deployment

WeActis utilizes Microsoft-native mechanisms, including the MS Graph API, to engage with your organization. The deployment is straightforward and non-intrusive, involving the installation of an enterprise app that syncs specific information. Installing WeActis in Microsoft Teams facilitates communication with users by providing them with relevant information and actionable steps.

The initial installation involves deploying an enterprise app in your Microsoft 365 tenant, which a user with administrative privileges must perform. Deployment within Teams also requires admin rights. A comprehensive deployment guide is available, detailing each step and the necessary permissions.

The first phase involves synchronizing your Microsoft 365 environment. Duration depends on your organization’s size and data volume (including users, Teams, SharePoint sites, and files), typically ranging from a few hours to several days. Once synchronized, deploying the Teams app takes just a few clicks. Integration support is included to ensure a smooth rollout.

WeActis integrates seamlessly with Microsoft Teams and is available on Microsoft AppSource. It can be deployed organization-wide or to specific groups through the Teams admin center. A detailed guide outlines all steps and technical requirements to ensure a fast and interruption-free installation.

Technical Requirements

The only requirement is an active Microsoft 365 Business Standard or Enterprise E3 license, along with the use of Microsoft Teams and SharePoint.

Absolutely. WeActis operates independently and doesn’t require Purview or sensitivity labels. Core features, such as managing sharing, resources, and external collaborators, function fully without these integrations. However, if your organization uses Purview, WeActis can enhance its risk analysis:

  • When a sensitivity label is applied to a shared file, WeActis factors it into the risk level in alignment with your data governance policies.
  • If Purview detects sensitive data, WeActis can notify users and guide them on taking appropriate actions to mitigate the risk.
    While the Purview integration provides added value, it is not necessary for the effective use of WeActis.

No. WeActis is currently integrated only with Microsoft Teams, which is the primary channel for user interaction. Its native integration provides a richer, more seamless experience than other messaging platforms can offer. Since WeActis focuses on risks within the Microsoft 365 ecosystem, this alignment ensures optimal efficiency, simplicity, and user adoption.

User Experience & Adoption

WeActis is designed to promote responsible and secure user behavior through a positive and empowering approach. It employs a delegated rights model: only the concerned user in Microsoft 365 can perform the required action. This limits third-party risk.

The admin dashboard offers complete visibility into risky behaviors, completed actions, and pending tasks. Managers can access information relevant to their teams and follow up directly through the application. This promotes shared responsibility for data protection throughout the organization, not just within IT or security teams.

WeActis only prompts employees when action is needed, minimizing disruptions. Notifications are customized based on user context. The experience is designed to be user-friendly and straightforward; most actions can be completed in just a few clicks and seconds. This ease of use promotes adoption and enables users to actively contribute to organizational security with minimal friction.

Mondata supports organizations throughout the deployment and adoption process. Various strategies and best practices foster long-term engagement and help embed WeActis into users’ daily routines. Key usage indicators (e.g., engagement rate) are tracked in real time, enabling adjustments to awareness efforts and maximizing the program’s impact.

Pricing & Return on Investment (ROI)

WeActis pricing is based on the structure of your Microsoft 365 tenant. It follows a tiered model, with a monthly cost determined by the number of users. Contact us for a customized assessment tailored to your organization’s specific needs.

Measuring cybersecurity ROI is complex due to the varying maturity levels of organizations. That said, WeActis provides clear, measurable indicators of value:

  • Number of document shares revoked by users
  • Number of access permissions removed or revised in Teams, SharePoint, and OneDrive
  • Number of resources proactively archived

These measures promote improved data hygiene within Microsoft 365. In the absence of WeActis, IT must intervene manually, resulting in costly implications involving tooling, context-free risk analysis, and back-and-forth communication with users. The result is often cumbersome, incomplete processes that compromise security. WeActis enables users familiar with their own context to respond swiftly and accurately, enhancing IT and security efficiency.

Moreover, as organizations adopt generative AI tools like Microsoft Copilot, clean data and well-managed access are critical. Poor hygiene may expose sensitive data via AI, leading to potential violations of privacy laws and financial penalties.
To learn more, read our ebook: “Microsoft 365, AI, and Unstructured Data: Protecting Your Business Information.

WeActis isn’t designed to replace a single tool but to address a key gap in data risk management: direct, continuous user involvement. It complements cybersecurity training solutions by enabling real, measurable action.

Some goals overlap with tools like Sharegate or Syskit, which are built for admins. However, WeActis stands out by decentralizing responsibility—empowering every user to act within their context and build a cybersecurity culture.
It alleviates the burden on IT and security teams, who often lack both the necessary resources and business context to make effective access or content decisions.

Yes. WeActis licensing applies to all IT-managed users, as all accounts are analyzed (“profiled”) to identify risks, regardless of whether they’ve been notified or the Teams app has been deployed. This ensures a complete and consistent view of your organization’s security posture.

Data Hygiene

Poor data hygiene creates fertile ground for security incidents. In Microsoft 365, data moves swiftly across teams, sites, and users. As the volume increases, cleaning up becomes more complex and expensive if it isn’t part of daily practices. Improving hygiene reduces the attack surface by:

  •  Preventing unintended leaks of sensitive documents due to overly broad or neglected sharing
  •  Limiting the impact of a compromised account by ensuring users only access what they truly need
  •  Supporting compliance with laws like Law 25, which require strict control over personal data.

With tools like Microsoft Copilot making data more accessible through AI, the risks associated with poor governance rise. Without strong hygiene, AI may expose confidential information to employees who should not have access to it. In summary, enhancing data hygiene means regaining control, safeguarding your reputation, and emphasizing prevention over reaction. It’s a core principle of cyber resilience.
WeActis fosters this as a collective habit, integrated into Microsoft 365, right where your data resides.