Conditional access policy not behaving as expected

Seger Steele 25 Reputation points
2025-01-15T18:54:32.7933333+00:00

We have multiple C-Suite users being brute-forced with the FastHTTP Go library.

This is resulting in lockouts of our users, even though we have a conditional access policy that blocks legacy auth. Providing screenshots below of the CAP Config

Applied to all users (only 6 service accounts excluded)
User's image

Grant = Block Access and applied to "Other clients".

User's image

Here is sign-in log showing a 'Other client' brute force attempt - which should be blocked by the CAP, but its not being applied.
User's image

Open to any ideas here, looking to understand:

  1. Why the CAP isnt performing as expected.
  2. How to get these attempts blocked.

Happy to provide more info, thanks everyone!

Microsoft Security Microsoft Entra Microsoft Entra ID
Microsoft Security Intune Other
Microsoft Security Microsoft Entra Other
0 comments No comments
{count} vote

Accepted answer
  1. Vasil Michev 119.5K Reputation points MVP Volunteer Moderator
    2025-01-16T08:01:05.4233333+00:00

    Conditional access policies will not help you here, as they apply post (first factor) authentication (i.e. after username/password has been verified). Even if a CA policy blocks the login attempt, at this point the attacker knows credentials were successfully verified. Instead, you should block basic auth using the workload-specific controls, i.e. block SMTP auth for Exchange, block legacy auth via Set-SPOTenant, etc.

    This doesn't mean you should not have a CA policy around this scenario, as it can still prevent bad actors from accessing your tenant. But it will not prevent brute-force attempts, or lockouts.


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.