<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE - Avoid users blocked account in AD in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-avoid-users-blocked-account-in-ad/m-p/5378877#M600094</link>
    <description>&lt;DIV class=""&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Prevent Active Directory User Lockout.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/261559i8BBC8B4AD94D6F83/image-size/large?v=v2&amp;amp;px=999" role="button" title="Prevent Active Directory User Lockout.jpg" alt="Prevent Active Directory User Lockout.jpg" /&gt;&lt;/span&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;Navigate to Administration &amp;gt; Identity Management &amp;gt; External Identity Sources &amp;gt; Active Directory.&lt;BR /&gt;Select your AD join point and go to the Advanced Settings tab.&lt;BR /&gt;Locate the Prevent Active Directory User Lockout section and check Enable Failed Authentication Protection&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN class=""&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Administration &amp;gt; Identity Management &amp;gt; External Identity Sources &amp;gt; Active Directory&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;Select your AD join point and go to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Advanced Settings&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tab.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;Locate the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Prevent Active Directory User Lockout&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;section and check&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Enable Failed Authentication Protection&amp;nbsp; &amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
    <pubDate>Mon, 23 Mar 2026 19:40:23 GMT</pubDate>
    <dc:creator>milannbrahmbhatt</dc:creator>
    <dc:date>2026-03-23T19:40:23Z</dc:date>
    <item>
      <title>Cisco ISE - Avoid users blocked account in AD</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-avoid-users-blocked-account-in-ad/m-p/5341902#M598697</link>
      <description>&lt;P&gt;Is it possible CISCO ISE can block or filter authentication attempts between the Wi-Fi device and Active Directory after a certain number of failed attempts, in order to prevent those attempts from reaching AD and prevent account lockouts.&lt;/P&gt;
&lt;P&gt;We've detected that when corporate Wi-Fi users change their password, if they keep the old credentials on their phone, the device continues to attempt to authenticate with them until the account is locked. How can mitigate this in the CISCO ISE.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 12:21:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-avoid-users-blocked-account-in-ad/m-p/5341902#M598697</guid>
      <dc:creator>SupportAC</dc:creator>
      <dc:date>2025-10-24T12:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Avoid users blocked account in AD</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-avoid-users-blocked-account-in-ad/m-p/5341958#M598699</link>
      <description>&lt;P&gt;Bit buried, but Admin -&amp;gt; Settings -&amp;gt; Protocols -&amp;gt; RADIUS&amp;nbsp;&lt;/P&gt;&lt;P&gt;Suppress repeated failures. This will open the options when checked. Keep in mind on the duration as I have not found a way to remove someone suppressed until it times out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-10-24 094558.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/254185iE5C49AEC8438CE5C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-10-24 094558.jpg" alt="Screenshot 2025-10-24 094558.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 14:48:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-avoid-users-blocked-account-in-ad/m-p/5341958#M598699</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2025-10-24T14:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Avoid users blocked account in AD</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-avoid-users-blocked-account-in-ad/m-p/5341965#M598700</link>
      <description>&lt;P&gt;I believe I know of 3 ways to bypass endpoint rejection before the suppression timeout occurs.&lt;BR /&gt;&lt;BR /&gt;1. If an endpoint is truly rejected, you can release it under Context Visibility-&amp;gt;Endpoints.&amp;nbsp; Look it up, click the checkbox, and see if the&amp;nbsp;&lt;STRONG&gt;Release Rejected&lt;/STRONG&gt; option is grayed out or clickable. It is on the same line as the refresh circle, the add /edit / delete buttons, and the Import/Export endpoints pulldowns.&lt;BR /&gt;&lt;BR /&gt;2. You can also check / release it using the APIs document on your PAN &lt;A href="https://PAN/ers/sdk" target="_blank" rel="noopener"&gt;https://PAN/ers/sdk&lt;/A&gt;&amp;nbsp; See the API documentation-&amp;gt;End Point section, calls ReleaseRejectedEndpoint and&amp;nbsp;GetRejectedEndpoints.&amp;nbsp; I just had an issue the last time I tested it (2.7 maybe?) where the GetRejectedEndpoints didn't paginate properly so I didn't trust the list it sent back to me (at that moment we were working with teams to sort out rejections, and it was more than the API could return on one page of results).&lt;/P&gt;&lt;P&gt;3. Navigate to&amp;nbsp;&lt;STRONG&gt;Administration-&amp;gt;System-&amp;gt;Logging-&amp;gt;Collection Filters&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;In that section, add your MAC Address as a &lt;STRONG&gt;Attribute-&amp;gt;MAC Address&lt;/STRONG&gt; with the&amp;nbsp;&lt;STRONG&gt;Filter Type-&amp;gt;Bypass Suppression&lt;/STRONG&gt;&amp;nbsp; It allows a bypass for the default time period, which I believe is 60 minutes.&amp;nbsp; When that time period has passed, it automatically changes from &lt;STRONG&gt;enabled&lt;/STRONG&gt; to&amp;nbsp;&lt;STRONG&gt;disabled&lt;/STRONG&gt;.&amp;nbsp; However, it stays on that list until manually deleted. So, if you use it often here, you'll have to manually clean up any suppression bypasses you had created on this screen.&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;David&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 15:38:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-avoid-users-blocked-account-in-ad/m-p/5341965#M598700</guid>
      <dc:creator>davidgfriedman</dc:creator>
      <dc:date>2025-10-24T15:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Avoid users blocked account in AD</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-avoid-users-blocked-account-in-ad/m-p/5341985#M598701</link>
      <description>&lt;P&gt;Suppression should work, but IMO, it's the wrong tool for the right job.&lt;/P&gt;
&lt;P&gt;Under the Advanced Settings of the AD connection, you find the option "Prevent Active Directory User Lockout". There are restrictions, but if these don't match your use case, it's the way to go.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 17:01:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-avoid-users-blocked-account-in-ad/m-p/5341985#M598701</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-10-24T17:01:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Avoid users blocked account in AD</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-avoid-users-blocked-account-in-ad/m-p/5378877#M600094</link>
      <description>&lt;DIV class=""&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Prevent Active Directory User Lockout.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/261559i8BBC8B4AD94D6F83/image-size/large?v=v2&amp;amp;px=999" role="button" title="Prevent Active Directory User Lockout.jpg" alt="Prevent Active Directory User Lockout.jpg" /&gt;&lt;/span&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;Navigate to Administration &amp;gt; Identity Management &amp;gt; External Identity Sources &amp;gt; Active Directory.&lt;BR /&gt;Select your AD join point and go to the Advanced Settings tab.&lt;BR /&gt;Locate the Prevent Active Directory User Lockout section and check Enable Failed Authentication Protection&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN class=""&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Administration &amp;gt; Identity Management &amp;gt; External Identity Sources &amp;gt; Active Directory&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;Select your AD join point and go to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Advanced Settings&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tab.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;Locate the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Prevent Active Directory User Lockout&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;section and check&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Enable Failed Authentication Protection&amp;nbsp; &amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Mon, 23 Mar 2026 19:40:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-avoid-users-blocked-account-in-ad/m-p/5378877#M600094</guid>
      <dc:creator>milannbrahmbhatt</dc:creator>
      <dc:date>2026-03-23T19:40:23Z</dc:date>
    </item>
  </channel>
</rss>

