We need more logs to clearly identify who impersonated whom, when and what activity was performed while impersonating.
You won't be notified about changes to this idea.