How to prevent account lockout from basic authentication attacks

Chris 0 Reputation points
2023-03-07T18:24:10.59+00:00

We have enabled Okta federation to handle MFA for our Office 365/AzureAD tenant. Some users are being locked out by suspicious activity from IP locations we never use. Looking at our sign in logs, hundreds of failed attempts from locations like France, China, Bangladesh and Singapore along with many others are logged as failed single factor attempts.

If I disable basic authentication, Outlook on the desktop does not connect to Exchange Online although I'm using the latest version of Outlook from Office 365.

Does anyone know how to prevent these basic authentication password attacks and block them? Is there something else I need to do in order to prevent accounts from being locked out by malicious actors?

Microsoft Security | Microsoft Entra | Microsoft Entra ID
{count} votes

2 answers

Sort by: Most helpful
  1. David Broggy 6,291 Reputation points MVP Volunteer Moderator
    2023-03-07T19:30:27.17+00:00

    Hi Chris,

    Have you tried tuning the lockout threshold?

    You could reduce the time the user is locked out, however that would make it easier for the attacker to guess passwords.

    Or have you tried blocking those IPs using conditional access? I personally would block the IPs rather than increase the password lockout time too much.

    reference:

    https://learn.microsoft.com/en-us/azure/active-directory-domain-services/troubleshoot-account-lockout

    https://www.penthara.com/configuring-conditional-access-policy-to-restrict-access-from-specific-ip-or-location/#:~:text=Login%20to%20Azure%20Portal%2C%20then,%3E%20Conditional%20Access%20%3E%20Named%20Locations.&text=2.,4.

    0 comments No comments

  2. Sandeep G-MSFT 20,906 Reputation points Microsoft Employee Moderator
    2023-03-09T08:24:34.4+00:00

    @Chris

    It is strange that your latest version of outlook is still using basic authentication. Earlier we have seen scenarios where there were lots of attacks that used to happen on IMAP and POP protocols. To overcome this and to make authentication more secure, we got the concept of modern authentication.

    To know why your outlook is not making use of modern authentication you will have to open a separate thread with exchange online team.

    However, to fix this issue for now, you can use conditional access policy in Azure AD and configure some range of IP addresses or configure named locations which you can use in conditional access policy. This policy will block or allow requests which are coming from specific defined IP address ranges or specific named locations.

    You can follow below article as well to configure the same,

    https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

    Let me know if you have any further questions.

    Please "Accept the answer" if the information helped you. This will help us and others in the community as well.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.