Prevent Account Lockout due to Brute Force Attack
Currently Azure Active Directory is locking Office 365 user accounts based on the number of failed sign-ins. If the user credentials are entered incorrectly, it does not check or verify existing Azure Conditional Access Policy, whether this account can sign-in from that location (Country or IP address) or not, because the authentication was not successful.
To prevent Azure AD account lockouts, can you design the Modern Authentication system in Azure AD to check for existing Azure Conditional Access Policy for failed logins coming from blocked locations (Country or IP address)?
This will help Office 365 Admins prevent account lockouts, sourced from known brute force attack locations.
I agree. Pleas proceed with this!!
We are a primary class lead age organization in Lahore Pakistan, offering the only lead age administrations to organizations. Call us to talk about your necessities lead age administrations, lead age Pakistan, best lead age administrations, top lead age organization
Esccort in Oman commented
+96896221446 | Have you been overwhelmed or have no idea about the steadfast and right escort association that has the measure to fulfill your fantasies and may give you the most secure time? Doha escort office brings genuinely exceptional and most appealing Call Girls to make your life stacked up with shades of vitality love and diversion. +96896221446
Vist Site: http://escortindoha.com/
Also, allow this feature without needing a P2 license. Country blocking should be a base feature not an add on if you are truly concerned with security.
Get this added, Microsoft!
This would be a valuable addition to office 365