After Okta ThreatInsight identifies an IP as suspicious, it records the IP in the logs and shows the result as "Allow".
- Okta ThreatInsight
In the Okta ThreatInsight settings, the option to “Log authentication attempts from malicious IPs” is selected.
This is expected behavior when ThreatInsight is configured to Log authentication attempts from malicious IPs, but this does not mean an unwanted connection attempt was accepted. To have the suspicious IP blocked, choose the Log and enforce security based on threat level option in the ThreatInsight settings. Those settings can be found in the Admin dashboard under Security > General > Okta ThreatInsight Settings.
