Prevent Account Lockout due to Brute Force Attack
Currently Azure Active Directory is locking Office 365 user accounts based on the number of failed sign-ins. If the user credentials are entered incorrectly, it does not check or verify existing Azure Conditional Access Policy, whether this account can sign-in from that location (Country or IP address) or not, because the authentication was not successful.
To prevent Azure AD account lockouts, can you design the Modern Authentication system in Azure AD to check for existing Azure Conditional Access Policy for failed logins coming from blocked locations (Country or IP address)?
This will help Office 365 Admins prevent account lockouts, sourced from known brute force attack locations.
I agree. Pleas proceed with this!!
Also, allow this feature without needing a P2 license. Country blocking should be a base feature not an add on if you are truly concerned with security.
Get this added, Microsoft!
This would be a valuable addition to office 365