Configure Access Settings
Limit access based on IP addresses. If you don't provide a allowlist or blocklist, the feature isn't active and these settings have no effect.
Business Manager IP allowlists and blocklists serve to lock out attackers who have, though illegitimate means, obtained valid credentials. For example, a former employee who obtained credentials when employed, or non-employees who obtained them via social engineering. These lists aren't intended to prevent brute force attacks.
If you log into Business Manager, and you aren't using Unified Authentication, these lists apply before your credentials are verified.
If you log in using WebDAV or the agent user login process, and you aren't using Unified Authentication, the lists apply after your credentials are verified.
If you log in using Unified Authentication, regardless of how you log in, these lists apply after your credentials are verified.