Searching protocol for "gpo abuse"
Exploit GPOs for AD control.
Dominate Active Directory environments.
Gain elevated access on target systems.