Cyber-attacks continue to increase in persistence and sophistication. Attackers use a variety of techniques to steal credentials, constantly seeking administrative access to fully control corporate and government computing environments. Loss of privileged user accounts results in attackers having access to most or all of an organization’s electronic documents, presentations, applications, databases, and other intellectual property. Additionally, attackers can implant backdoors on any system, which can often evade antimalware and intrusion detection systems. Organizations should seek to protect admin accounts as one of their most valuable assets. The only safe recovery from an admin compromise is building a brand new environment, which can be extremely difficult, slow, and expensive.