We love to hear your feedback. Your suggestions and ideas are important to us. Our feedback forum is a great place to post your ideas and vote on others. Please share your detailed use case and how the proposed enhancements can increase value to your business. We do read all of your posts, but may not be able to respond to all comments.
More information on the status of submitted ideas can be found here
This is required for us too as it leaves us exposed to malicious changes and creates better control of system architecture .
Yes - I am currently using a monitoring report to see who has controlled a sys admin or regional admin account - these are the ones with access to all or some system settings