Are you in AD enviroment..?? If yes enumerate the users and the Ad enviroment.. then make sure you are domain Admin ..the spread from one network to another
2. If not in AD ..i suggest you look for vulnerabilities available on the other computers in a network by scanning them using the compromised machine as a PIVOT POINT