Admins and Security Engineers at the organization level should be able to isolate and de-isolate hosts. It would be even better if we could have granular control over user roles. For example if we could create our own roles and select which individual permissions they should have.