Sebastien/Rod - This request is still on our list at this time - but has not received an update we can share just yet. With that being said, you can find a log entry like the one below in your Administrative logs in each scenario that generates an IDS block:
[2021.04.21] 11:03:43.375 [BruteForceBySession] [Smtp] Added xxx.xxx.xxx.xxx to IDS block list. Duration: 7200 seconds, Description: Password Brute-Force by IP
If you find one of your end users is being blocked regularly, you can start by searching the Administrative logs for an entry like this one, then look in and around there to see what authentication attempts or other actions might have caused it. I hope this helps!
Kyle Kerst
IT Coordinator
SmarterTools Inc.
www.smartertools.com