The ability to get a md5 or better yet a SHA-256 hash of the config file that is downloaded. To meet some audit findings, we have had to go away from NCM as it didn't create a hash for the file. Hashing the file shows if the file has been changed at all even if the changes have been backed out.