Curious about who has access to your systems? This task unveils the mystery by identifying all users with access privileges. By determining who can access what, we lay the foundation for a secure environment. Are we aligned with NIST 800-171? Let's find out! The goal here is to have a comprehensive list of active users. Challenges? Yes, there will be some! A user directory tool could come in handy to simplify this process.