Azure MFA NPS Extension: brute forces via non allowed accounts

Pieter Huygens 25 Reputation points
2025-01-31T10:57:13.8133333+00:00

Dear,

We've setup NPS with Azure MFA 3rd party extension for our SSLVPN. Via the network policy in NPS we've limited VPN access to a specific security group.

However: now we see that our onpremise Administrator account locks out frequently. Further research leads us to the source: brute forces via SSLVPN on the administrator account.

The strange thing is that our administrator account is not in the specific VPN security group we've defined in the connection request policy.

In the event vwr we see this as an error on the administrator brute force attempt: ""The request was discarded by a third-party extension DLL file"

How does this come? I expected that the administrator connection attempt was denied before contacting Azure AD or before the login was attempted through onpremise AD because administrator user was not in the specific security group.

Any ideas? Is this normal behavior when Azure AD MFA 3rd party MFA extension was installed?

Thank you so much!

Pieter

Windows Server 2019
Windows Server 2019
A Microsoft server operating system that supports enterprise-level management updated to data storage.
3,885 questions
Windows Server
Windows Server
A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.
13,622 questions
Microsoft Entra ID
Microsoft Entra ID
A Microsoft Entra identity service that provides identity management and access control capabilities. Replaces Azure Active Directory.
23,066 questions
0 comments No comments
{count} votes

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.