A common scenario during an assessment or pentest is starting it from a VDI environment, focused towards "what could an insider or an attacker who has stolen a worker's credentials do". This type of...