Adversaries may attempt to get a listing of valid accounts, usernames, or email addresses on a system or within a compromised environment. Tactics TA0007 Sub-techniques T1087.001 T1087.002 T1087.003 T1087.004 See: MITRE ATT&CK