Spend some time and read over the result of your enumeration.
if WinPEAS or other tool finds something interesting, make a note of it.
Avoid rabbit holes by creating a checklist of things you need for the priviledge escalation method to work.
Have a quick look around for files in user's desktop and other common location (ex: C:\ and C:\Program Files), Read through interesting files that you find, as they may contain useful information that could help escalate priviledge.
Have a good look at admin processes, enumerate their versions and search for exploits.
check for internal port that you might be able to forward to your attacking machine.
Try things that don't have many steps firs:
registry exploit, services, etc.
If you still don't have an admin shell, re-read your full enumeration dumps and highlight anything that seems odd. This might be a process or file name you aren't familiar with or even a username.
At this stage you can also start to think about Kernel Exploit.