Hello @Tim-3422,
Thanks for reaching out and apologize for inconvenience caused.
Currently, it is not possible for administrators to unlock the users' cloud accounts if they have been locked out by the Smart Lockout capability. The administrator must wait for the lockout duration to expire. However, the user can unlock by using the self-service password reset (SSPR) from a trusted device or location (https://aka.ms/SSPR).
However, in this case I would strongly recommend you to use Azure AD Sign-ins logs which provided more insight and might help you with finding where exactly the lockouts where occurring rather than just unlocking users account, see below screenshot for your reference:
Because, using smart lockout doesn't guarantee that a genuine user is never locked out. When smart lockout locks a user account, we try our best to not lock out the genuine user. The lockout service attempts to ensure that bad actors can't gain access to a genuine user account. The following considerations apply:
- Each Azure AD data center tracks lockout independently. A user has (threshold_limit * datacenter_count) number of attempts, if the user hits each data center.
- Smart Lockout uses familiar location vs unfamiliar location to differentiate between a bad actor and the genuine user. Unfamiliar and familiar locations both have separate lockout counters.
More information : https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-password-smart-lockout
Hope this helps.
--------
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.