Roadmap
Changelog
We created a special place in our website to receive all your comments!
new
Go to feedback.boardgent.com and share with our community all the feedback you have. Write comments or changes you consider should be placed in our roadmap. It is up to you! After you post it, other users with the same need can vote for your comment, giving it a higher rank of priority for our development team. Can’t wait hearing from you.
P15
Easily find the password you’re looking for
new
Whenever something goes wrong with your computer, and you need to restore a backup you did in the past, or a snapshot of a virtual machine, with Boardgent, you can filter your passwords history by date range and find as soon as possible the one you're looking for.
Improve your computers’ log audits by asking the reason to request a security local password.
new
Ask your IT team members the reason for requesting a local password to audit the processes they're performing and identify unauthorized accesses.
Filter your executions by multiple variables
improved
Now, you have several ways to audit the executions made on your computers. Filter logs by device, date range, action executed, process stage, and user!
P17
Uninstall software that your company no longer use
new
If you're looking to massively uninstall software that you no longer use, such as McAfee or Onedrive, use Boardgent to do so. We will add other applications as soon as our users request them.
P16-01
Manage your computers’ security passwords
new
Now you can manage the Windows administrator, BIOS, and UEFI passwords directly from the Boardgent cloud console. Expire the password whenever you need it, configure the passwords' length and complexity, and automatically change it frequently. The log audits will show you who uses or changes the password and the date and time when it happened.
P14
Use more detailed hardware information to diagnose the status of your computers' security.
new
Find new information in the hardware inventory section, such as hard drive partitions and configurations, to determine if you can encrypt your computers with BitLocker.
Also, use the boot order to identify if the order of the listed devices suits the corporate security policies to prevent unauthorized users from loading an operating system from an external drive and stealing confidential information.
Configure the permissions of your team members in a customized way
improved
Before, you needed to assign your team members to platform-defined roles. Now, we list all the permissions individually for you to create your own.
P11
Do you need to create a system partition to enable BitLocker?
new
Remotely create a system partition in your devices by executing it in the OS Management section.
Available information about installed disks in your computers
improved
Find in the inventory section detailed information on the installed disk in your computers, its size, health, serial and partition type (MBR or GPT). Also, identify all the partitions the disk has, their size, and if they meet the requirements to be encrypted.
P09
Load More