Watch this video on YouTube
When attempting to maintain persistence on a hacked Windows Server, what technique is most effective?