Feedback by UserVoice

Ben Bazian

My feedback

  1. 182 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    13 comments  ·  Office 365 Admin  ·  Flag idea as inappropriate…  ·  Admin →
    Ben Bazian supported this idea  · 
  2. 3,535 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    197 comments  ·  Office 365 Security & Compliance  ·  Flag idea as inappropriate…  ·  Admin →

    Azure Active Directory Conditional Access has functionality for “Countries/Regions” – see https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

    That said, the most effective protection you can have against password spray attacks is to enable MFA and disable basic authentication. If you cannot do this for your entire organization, then blocking user access to legacy protocols like POP, EWS, IMAP and SMTP is another step you can take. Exchange Online Client Access Rules can help you to further customize (https://docs.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/client-access-rules/client-access-rules). For additional recommendations, please see Office 365 Secure Score.

    That said, please know that we are listening to feedback and working on solutions to help make Office 365 users more secure. Thank you for the feedback.

    Ben Bazian supported this idea  · 
    An error occurred while saving the comment
    Ben Bazian commented  · 

    Blocking IP access and regional access should be a basic option. Should not have to pay an arm and a leg to protect my accounts.

  3. 94 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    An error occurred while saving the comment
    Ben Bazian commented  · 

    The DLP policies need better tools to allow the fine tuning of the policies. We get way too many false positives for us to be able to block access. There should also be the ability to exclude certain senders from the policy that generate most of the false positives.

Feedback and Knowledge Base