Critical Infrastructure Cybersecurity Framework
T1087Discovery1 Mitigations

Account Discovery

Adversaries may attempt to get a listing of valid accounts, usernames, or email addresses on a system or within a compromised environment.

Description

Adversaries may attempt to get a listing of valid accounts, usernames, or email addresses on a system or within a compromised environment.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Operating System Configuration

Quick Info

Technique ID
T1087
Tactic
Discovery
Sub-Techniques
4
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.