When is it necessary? when entering an important command into a critical system that affects thousands of users.
Or when you have to review your network to make sure no holes are found.
the attacks on your network are relentless:
Once they own your machines they will use your machines to attack others. It is important to double check your machines for any holes, it is what prudent businesses do.