Windows information gathering using Powershell: a brief cheatsheet | So Long, and Thanks for All the Fish
During a penetration test, once you get a local access to a target, you should start a local assessment of the machine in order to plan a correct tactic for privileges escalation and lateral movement.