By using Windows™ impersonation, you are able to leverage the Windows-level security permissions for file access. If your system is set up to use NTFS, you can then control access to files and directories for users and groups.
Windows™ impersonation also allows you to use
Windows™ system monitoring tools to see which users are running which
unica_acsvr processes on the server.