Hello Jon,
I think the following might be able to help. There is really not an easy way to do it since WPA2 always authenticate users. Unless there is an easier way to ban the wireless device in question quickly without log into the VNS web interface, etc... but we all know to ban a wireless device in controller requires many clicks and multiple layer of screens-- it is possible but not durable. the AD account is locked long time ago before you can lunch and get to the VNS interface.
The goal is to use MAC and User authentication together. You can accomplish this by enforcing authentication on switch side of esa port uplink instead of enforcing within VNS. From there, you will be able to control device and user together or separately through NAC by put the MAC address in question in blacklist group--thus it will "quarantine" the device without triggers AD account lockout.
Between associated VNS and switch port with policy enabled, you should use Policy-to-VLAN mapping feature to ensure the policy enforced on switch that is "tunnel" down to VNS as VLANs.
In this suggestion, radio and AP level, device is still trying to authenticate, but any traffic by that wireless MAC is dropped at the uplink port of esa-to-switch port. it gave a apparent of "stopping" Device from communicating.
hope this helps.
PS, ensure you have enough port license for policy on switch side.
-cy