Skip to content

Help shape the future of Box

Welcome to Box Pulse, our product feedback tool powered by UserVoice. Got an idea for how to improve Box? Share it with us and gather support or vote on other people's ideas. Your feedback is essential to informing roadmap decisions and shaping the future of our products. Thanks for joining our community!

See user guide here.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback

210 results found

  1. Box Shield

    Can we have more granular on the detection rules, e,g, down to user groups, or individual account level - allowing customers to set priorities as high for some user groups, but low for others.  For some users, a customer may expect high levels of downloads/activity in Box and this may be in peaks and troughs - therefore potentially a lower priority, whereas with execs this activity should be treated as a higher priority and greater risk.

    1 vote
    0 comments  ·  Shield  ·  Admin →
    How important is this to you?
  2. Using Smart Access

    When entering a List when creating a Shield Smart Access Policy, have drop down appear that shows all available lists with short descriptions so the user doesn't have to try to remember the names of the lists they created or what they generally contain.

    1 vote
    0 comments  ·  Shield  ·  Admin →
    How important is this to you?
  3. Visibility and controls on externally owned content

    Box admins should be able to restrict their users from uploading or moving sensitive content to folders that are owned by another Box instance. There should be controls around what defines sensitive content. Box admins should have visibility into what's uploaded or moved into the external folders in reports.

    1 vote
    0 comments  ·  Shield  ·  Admin →
    How important is this to you?
  4. 4 votes
    0 comments  ·  Shield  ·  Admin →
    How important is this to you?
  5. We want the ability for Download policies to also trigger on unusual download activity by external collaborators

    We see external collaborators with high download activity using accounts outside of our enterprise (ie: gmail, yahoo?). The business is getting quite frustrated that they cannot report on these email addresses.

    3 votes
    0 comments  ·  Shield  ·  Admin →
    How important is this to you?
    not planned  ·  Anonymous responded

    This is quite complex to implement, we are researching to figure out how best to fix this.

  6. Set default classification for all uploads with Box Classification

    When every file is uploaded, set a default Classification value that can be updated manually or via a partner (Netskope, SkyHigh, Titus, etc.).

    13 votes
    0 comments  ·  Shield  ·  Admin →
    How important is this to you?

    Default classification label is not planned because it could be misleading to end users. However, to address the concern of content being leaked before it is classified, you can create an access policy applying to “All content without a classification label” in Box Shield.

  7. Granular permissions per user for sharing public links/classified documents

    The administrator should be able to set the default classification for all new documents (e.g. For Official Use).

    Each user should be able to set their own default classification (which will override the system setting (e.g. Classified).

    Each user should be able to change the classification for any new or existing document where she has sufficient rights. For existing documents, she should also be able to select multiple documents, and then change the classification for all those documents in one go.

    1 vote
    0 comments  ·  Shield  ·  Admin →
    How important is this to you?

    Default classification label is not planned because it could be misleading to end users. However, to address the concern of content being leaked before it is classified, you can create an access policy applying to “All content without a classification label” in Box Shield.

  8. Events API - Add Policy Name to CONTENT_WORKFLOW_UPLOAD_POLICY_VIOLATION

    Currently, when an Upload Policy violation occurs, Box reports on that violation in 3 ways:
    1. Email notification
    2. Admin Console -> Reports tab
    3. Events API

    In the email notification and admin console->reports, Box provides the policy name for which the violation is occurring. However, Box does NOT include the policy name in the Events API entry, which causes a problem when we are pulling logs (via the Events API) into external reporting/SIEM tools like ArcSight/Splunk.

    Request: Add 'Policy Name' to the CONTENTWORKFLOWUPLOADPOLICYVIOLATION entry in the Events API (to reach parity with the native Admin…

    1 vote
    not planned  ·  1 comment  ·  Shield  ·  Admin →
    How important is this to you?
  9. Privileged user audit controls

    We would like to request a feature enhancement please to provide a new email alert to be triggered to a specified group of users when a global enterprise search is performed by a privileged Box admin user from the Box admin console.

    We had an insider attack last year which included theft, abuse of privileges, credit card fraud and more. One of the methods he used was to perform enterprise level searches (credit cards, passports, drivers licences) across the whole Box environment.

    Whilst we can manually look for these events via a report, this is far to slow to catch…

    0 votes
    0 comments  ·  Shield  ·  Admin →
    How important is this to you?
  10. 0 votes
    not planned  ·  0 comments  ·  Shield  ·  Admin →
    How important is this to you?
1 2 7 8 9 11 Next →
  • Don't see your idea?

Help shape the future of Box

Categories

Feedback and Knowledge Base