
idcp0 (idcp0) asked a question.
Good Morning,
I'm seeing brute force attacks for various people in out company, and the problem is the IP's are constantly changing, which causes accounts lockouts.
I'm curious what other people are doing to prevent this?
Below is a list that we have tried which helps, but does not resolve the issue.
Prevent AD accounts from locking out while locking out Okta
Using Zones to prevent access from certain geographical locations.
Manually add IPs to block logged attempts.
Please note:
Manually adding IPs is manual and is constantly changing.
Zones does not work for multinational companies that have offices in that location. It is applied at the Organization level and not group level.
The suggestion I was given was to manually add the IPs to block them, but I feel there has to be a better way to this.
Perhaps I maybe missing features like -
Does Okta have a captcha if x amount of password tries have been attempted?
Does Okta have a soft IP block for x x amount of password tries have been attempted?
Please let me know if there is something i missed in this list.
*Frustrated Admin*

We finally hit upon something that works, but are still deciding if we can make this default in our Office tenant (and turn it back on for users who request it and certain service accounts that require it) or if we are just going to turn this off upon request. It seems the vast majority of our account lockout problems are originating from legacy SMTP Authentication requests (only POP and IMAP appear to use this, as shown in this very recent article):
https://docs.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/disable-basic-authentication-in-exchange-online
We tested this in real time by finding a user getting hit every 15 seconds and flipping SMTP Auth off. The attacks stopped almost immediately. We then turned it back on and the attacks resumed. To do this on a per-user mailbox, you connect to your Office 365 tenant via PowerShell and run this command:
Set-CASMailbox -Identity user@domain.com -SmtpClientAuthenticationDisabled $true
You can also turn off SMTP Auth globally via a transport rule, then re-enable on a per-mailbox basis if needed.
Just turning off POP and/or IMAP in the Office 365 admin GUI doesn't turn off SMTP Auth, we found we could actually leave them on and just disable SMTP Auth (not sure why you would want to do that but it did explain why turning off POP and IMAP in the GUI didn't get the results we wanted).
No guarantee this is totally effective, but it's definitely stopping the bulk of our lockout problems for the mailboxes we have tested on, at least for the time being.