Hello Bevan Calliess,
The AADSTS50126 error is triggered when a user enters an incorrect password during sign-in.
The AADSTS50053 error occurs when a user repeatedly enters an incorrect password, often originating from countries such as Vietnam, Ecuador, and Iraq, as you described. Due to multiple failed sign-in attempts, the account is flagged as risky, and the user is subsequently blocked.
You can find more information about this error here: Microsoft Entra authentication and authorization error codes.
For more details, please refer to the document on Protect user accounts from attacks with Microsoft Entra smart lockout
Using Conditional Access policies instead of Security Defaults provides more flexibility in securing user sign-ins from unmanaged devices or unfamiliar locations.
Security Defaults only enforce MFA at the time of application sign-ins and offer limited control. In contrast, Conditional Access policies provide more advanced options to secure your tenant—such as blocking sign-ins from specific locations using location-based policies.
Security Defaults, Per-user MFA, and Conditional Access policies each offer different levels of security. You can choose the most suitable option based on your organization’s security requirements.
- Security Defaults enforce MFA at sign-in for all users but offer limited customization. They do not require Premium P1 or P2 licenses, but you cannot exclude specific users or tailor conditions.
- Per-user MFA allows you to enable MFA on a per-user basis. However, it does not support exclusions based on applications or conditions.
- Conditional Access policies provide granular control and allow targeting specific users, apps, device platforms, and sign-in conditions. This is the most flexible and secure option for managing access. Requires Premium P1 License at least.
For more information, please refer to the following resources on:
Blocking sign-ins based on location