A cloud-based identity and access management service for securing user authentication and resource access
Microsoft Entra multifactor authentication detects unusual activity such as repeated sign-in attempts and may block additional attempts automatically to counter security threats. When many attempts are made, it can also lead to sign-in issues or lockouts for the legitimate user.
To reduce the impact on daily work, the following actions are available within the documented behavior:
- Rely on Entra MFA protections
- Entra MFA is already identifying these as unusual attempts and can prevent additional attempts after repeated failures.
- If sign-in attempts are being blocked, no further action is needed to keep the account secure from those attempts.
- Work with the IT administrator
- For a work or school (Entra ID) account, an IT administrator can review the Microsoft Entra sign-in logs to confirm the source and pattern of the attempts and adjust security policies if needed.
- If malicious activity is suspected, the IT administrator is the escalation path to investigate and tune protections.
- Username and sign-in
- The provided documentation does not describe a way, in Entra ID, to globally prevent attackers from attempting username/password entry or to stop all prompts while still using MFA.
- It also does not describe a supported method in Entra ID to change the sign-in name specifically to stop such attempts.
If sign-in has already been attempted many times and access is temporarily blocked, waiting for the block to expire or using a different MFA method is recommended. If there is concern that someone else is trying to access the account, contacting the IT administrator to review sign-in logs is the documented next step.
References: