Help shape the future of Box
Welcome to Box Pulse, our product feedback tool powered by UserVoice. Got an idea for how to improve Box? Share it with us and gather support or vote on other people's ideas. Your feedback is essential to informing roadmap decisions and shaping the future of our products. Thanks for joining our community!
See user guide here.
206 results found
-
Using Smart Access
When entering a List when creating a Shield Smart Access Policy, have drop down appear that shows all available lists with short descriptions so the user doesn't have to try to remember the names of the lists they created or what they generally contain.
1 voteNot planned in near term
-
Visibility and controls on externally owned content
Box admins should be able to restrict their users from uploading or moving sensitive content to folders that are owned by another Box instance. There should be controls around what defines sensitive content. Box admins should have visibility into what's uploaded or moved into the external folders in reports.
1 vote -
Granular permissions per user for sharing public links/classified documents
The administrator should be able to set the default classification for all new documents (e.g. For Official Use).
Each user should be able to set their own default classification (which will override the system setting (e.g. Classified).
Each user should be able to change the classification for any new or existing document where she has sufficient rights. For existing documents, she should also be able to select multiple documents, and then change the classification for all those documents in one go.
1 voteDefault classification label is not planned because it could be misleading to end users. However, to address the concern of content being leaked before it is classified, you can create an access policy applying to “All content without a classification label” in Box Shield.
-
Events API - Add Policy Name to CONTENT_WORKFLOW_UPLOAD_POLICY_VIOLATION
Currently, when an Upload Policy violation occurs, Box reports on that violation in 3 ways:
1. Email notification
2. Admin Console -> Reports tab
3. Events APIIn the email notification and admin console->reports, Box provides the policy name for which the violation is occurring. However, Box does NOT include the policy name in the Events API entry, which causes a problem when we are pulling logs (via the Events API) into external reporting/SIEM tools like ArcSight/Splunk.
Request: Add 'Policy Name' to the CONTENTWORKFLOWUPLOADPOLICYVIOLATION entry in the Events API (to reach parity with the native Admin…
1 vote -
Privileged user audit controls
We would like to request a feature enhancement please to provide a new email alert to be triggered to a specified group of users when a global enterprise search is performed by a privileged Box admin user from the Box admin console.
We had an insider attack last year which included theft, abuse of privileges, credit card fraud and more. One of the methods he used was to perform enterprise level searches (credit cards, passports, drivers licences) across the whole Box environment.
Whilst we can manually look for these events via a report, this is far to slow to catch…
0 votes -
Selectively disable syncing to mobile and desktop based on content classification and/or user group.
0 votes
- Don't see your idea?