10 min read
Encompass Cloud Hosting Configuration Guide: Setup, Security, and Performance
In this guide: Encompass Hosting Models Explained Infrastructure Requirements Security Configuration for Compliance Performance Optimization ...
Information Security Compliance
Add security and compliance to Microsoft 365
BI Reporting Dashboards
Realtime pipeline insights to grow and refine your learning operation
Integrations for Banks & Credit Unions
Connect LOS, core platforms, and servicing system
Productivity Applications
Deploy customized desktop layouts for maximum efficiency
Server Hosting in Microsoft Azure
Protect your client and company data with BankGrade Security
10 min read
Justin Kirsch : Mar 3, 2026 7:12:25 AM
Mortgage companies handle some of the most sensitive financial data in any industry: Social Security numbers, income verification documents, bank statements, tax returns, and closing documents. Every one of those data points flows through Microsoft 365 at some point. Conditional Access is the M365 feature that decides who can access what, from where, under which conditions. Getting it wrong means borrower data exposure. Getting it right means a defensible security posture that satisfies regulators and protects your business.
This guide covers the specific conditional access configurations mortgage companies need in 2026, from baseline policies that every lender should have to mortgage-specific scenarios like field loan officers on personal devices and third-party vendor access during closings.
In February 2026, Microsoft documented an active OAuth token theft campaign targeting Microsoft 365 tenants. Attackers bypassed MFA by stealing OAuth tokens through phishing. Mortgage companies are high-value targets because of the wire transfer processes tied to closings. The FBI's 2024 IC3 report showed $2.77 billion in business email compromise losses, with real estate wire fraud among the most common attack scenarios. Conditional Access policies are the primary defense layer that determines whether a compromised token can actually reach borrower data.
In This Article
Most mortgage companies focus their security budget on endpoint protection and email filtering. Those matter, but they miss the architectural question: once someone authenticates to your Microsoft 365 tenant, what can they actually do? Conditional Access answers that question at the policy level, before any data is accessed.
Think of Conditional Access as a decision engine. Every time a user, device, or application requests access to your M365 resources, Conditional Access evaluates the request against your policies: Is this user who they claim to be? Is their device compliant with your security requirements? Are they connecting from a trusted location? Does their sign-in behavior look normal? Based on those answers, the policy either grants access, blocks access, or requires additional verification.
For mortgage companies, this matters more than most industries. Your M365 tenant contains borrower PII, closing documents, wire transfer instructions, and communications with title companies. A single compromised account without conditional access controls can access all of it. With properly configured policies, that same compromised account hits a wall: wrong device, wrong location, wrong risk level.
"Mr. Cooper's 2023 breach affected 14.6 million borrowers. LoanDepot's 2024 attack exposed 16.6 million. Both incidents started with credential compromise. Conditional Access policies would have introduced additional verification barriers at the point of access."
Mortgage Industry Breach Analysis, 2025These five policies form the minimum viable security layer. If your mortgage company has none of these in place, start here.
Every user account needs multi-factor authentication enforced through Conditional Access. That includes loan officers, processors, underwriters, closers, compliance staff, and every administrator. "We'll do it later for the field team" is how breaches happen. Use Conditional Access-based MFA (not legacy per-user MFA) for centralized policy management and better reporting.
Legacy authentication protocols (POP3, IMAP, SMTP AUTH, ActiveSync basic auth) bypass MFA entirely. If any application in your environment still uses these protocols, it creates a backdoor past every other security control you've built. Create a Conditional Access policy that blocks legacy authentication for all users. Check sign-in logs to identify any legacy connections before flipping the switch.
A Conditional Access policy should require device compliance (managed through Microsoft Intune) before granting access to Exchange Online, SharePoint, and Teams. This means the device must meet your organization's minimum security requirements: encrypted storage, current OS, active endpoint protection. Without this policy, a user can access borrower documents from any device, including compromised personal machines.
Configure sign-in frequency policies to require reauthentication after periods of inactivity. For mortgage companies handling borrower data, a 12-hour maximum session lifetime for standard users and 4-hour maximum for administrators is a reasonable baseline. Persistent browser sessions should be disabled for any role that accesses borrower PII.
Enable sign-in risk detection that flags impossible travel scenarios. If a loan officer signs in from Dallas at 2:00 PM and someone attempts to sign in with the same credentials from Eastern Europe at 2:15 PM, that's a compromised credential. The Conditional Access policy should block the suspicious sign-in and require password reset.
ABT's security team has configured conditional access policies for mortgage companies ranging from independent brokerages to top-50 lenders. We can assess your current configuration and identify gaps in one conversation.
Talk to an Expert
The baseline policies work for any organization. These next scenarios address situations unique to mortgage operations.
Loan officers visit borrower homes, real estate offices, and branch locations. They need M365 access from locations outside your corporate network, often from personal mobile devices. The conditional access approach: create a policy that allows mobile access to Outlook and Teams from personal devices but restricts access to SharePoint document libraries containing borrower files. Personal devices get email and calendar. Borrower documents require a company-managed device with Intune compliance.
Mortgage processors working from home access sensitive documents all day: tax returns, bank statements, credit reports, and closing disclosures. Their conditional access policies should be stricter than field staff: require a compliant, company-managed device with full Intune enrollment, restrict access to approved applications only (no browser-based access from personal machines), and enforce session timeouts that prevent documents from remaining accessible on an unattended home workstation.
Title companies, appraisers, underwriting partners, and settlement agents all need some level of access to your systems during the loan lifecycle. Conditional Access handles this through guest access policies: restrict guest users to specific SharePoint sites or Teams channels, require MFA from specific trusted domains only, block guests from downloading documents (view-only access), and set automatic guest expiration (30 or 60 days after the loan closes).
Define named locations in your Conditional Access policies for each branch office's IP range. Access from a recognized branch IP can proceed with standard MFA. Access from an unrecognized network (home, coffee shop, airport) triggers additional verification: device compliance check plus step-up authentication. This creates a two-tier trust model without blocking remote work entirely.
Your loan origination system (Encompass, Byte, Calyx) and point-of-sale portal may integrate with M365 through APIs or service accounts. These service connections need their own Conditional Access policies: restrict the service principal to specific IP ranges (your LOS hosting provider), limit the OAuth permissions to only what the integration requires, and monitor sign-in logs for any anomalous activity from these accounts.
Conditional Access decides whether to grant access. Device compliance policies (managed through Microsoft Intune) define what "compliant" means for your mortgage company's devices. These two systems work together: conditional access checks the compliance status, Intune determines the compliance requirements.
For any device accessing borrower data, your Intune compliance policy should require:
When a user attempts to access M365 from a device that fails any compliance check, the Conditional Access policy blocks access and displays a remediation message: "Your device does not meet your organization's security requirements." The user can see exactly which requirement failed and take action to fix it (update their OS, enable encryption, etc.) before trying again. Non-compliant device equals no access to borrower data. No manual intervention from IT required.
Most mortgage companies have a mix of company-owned laptops (processors, underwriters) and personal devices (loan officers' phones). Intune supports both through different enrollment types:
Location and risk policies add intelligence to your conditional access framework. Instead of treating every access request the same, these policies evaluate context and adjust requirements accordingly.
Define your trusted network locations in Entra ID:
Named locations allow policies to differentiate between "employee at the office" and "employee at a coffee shop." Both can access M365, but the coffee shop user gets additional verification requirements.
If your mortgage company operates exclusively in the United States, block sign-ins from countries where you have no employees or business operations. This immediately eliminates a large percentage of credential-stuffing and brute-force attempts. Create exceptions for specific countries if employees travel internationally, but require step-up MFA from those locations.
Microsoft Entra ID Protection assigns a risk level (low, medium, high) to each sign-in based on behavioral analysis:
Your conditional access policies should respond to each risk level: low risk proceeds with standard MFA, medium risk requires step-up authentication (phone call or FIDO2 key), high risk blocks access and requires password reset with IT verification.
Wire fraud during mortgage closings is one of the most financially devastating BEC attack scenarios. The attacker compromises a loan officer or title agent's email, then sends modified wire instructions to the borrower. Conditional Access policies help prevent this by ensuring that access to email from unfamiliar devices or locations requires additional verification, making it harder for an attacker with stolen credentials to send emails that appear legitimate. Combine this with mail flow rules that flag outbound messages containing wire transfer language for manual review.
"The FTC Safeguards Rule requires mortgage companies to implement access controls that limit who can access customer information based on their role and need. Conditional Access policies in Microsoft 365 are a direct implementation of this requirement."
FTC Safeguards Rule, 16 CFR Part 314Conditional Access configurations should not be deployed all at once. Microsoft provides a "report-only" mode that logs what each policy would do without actually enforcing it. Use this mode to validate policies before turning them on.
Conditional Access is not a set-and-forget configuration. Review policies monthly to account for new employees, new branch offices, new vendor relationships, and new threat patterns. ABT's Guardian monitoring layer tracks conditional access policy changes and alerts on any modifications, ensuring your policies stay at your intended security level.
ABT has configured conditional access policies for mortgage companies ranging from independent brokerages to top-50 lenders. Our team understands the specific scenarios mortgage operations face, from field loan officers to closing-day vendor access.
Talk to an ExpertConditional Access requires Microsoft Entra ID P1, which is included in Microsoft 365 Business Premium, E3, and E5 licenses. Advanced features like sign-in risk policies and user risk policies require Entra ID P2, available in M365 E5 or as a standalone add-on. Most mortgage companies on Business Premium have the baseline Conditional Access functionality they need. The P2 features add risk-based intelligence that is recommended but not strictly required.
The FTC Safeguards Rule requires mortgage companies to implement access controls based on user role and business need, encrypt customer information in transit, use multi-factor authentication for anyone accessing customer data, and monitor for unauthorized access. Conditional Access policies directly address each of these requirements within Microsoft 365 by controlling who can access what resources, from which devices, and under which conditions. Your Conditional Access policy documentation serves as compliance evidence during audits.
Conditional Access policies reduce wire fraud risk by making it harder for attackers to access compromised email accounts. When an attacker obtains stolen credentials, Conditional Access policies block the sign-in if the device is not compliant, the location is suspicious, or the risk level is elevated. This forces the attacker through additional verification barriers. Combined with mail flow rules that flag messages containing wire transfer language, Conditional Access significantly raises the difficulty of executing a BEC wire fraud attack.
Use Microsoft Intune Mobile Application Management without full device enrollment. This creates a protected container on the personal phone for M365 apps like Outlook and Teams. The Conditional Access policy allows access to email and calendar from MAM-protected apps but blocks access to SharePoint document libraries containing borrower files unless the device is fully enrolled and compliant. This gives loan officers mobile access to communication tools while keeping sensitive documents restricted to company-managed devices.
Security Defaults is a one-size-fits-all toggle that enables basic MFA and blocks legacy authentication for all users. It cannot be customized. Conditional Access policies provide granular control: different requirements for different users, devices, locations, applications, and risk levels. Mortgage companies should use Conditional Access policies instead of Security Defaults because mortgage operations require scenario-specific policies for field loan officers, third-party vendors, and different device types that Security Defaults cannot accommodate.
CEO, Access Business Technologies
Justin Kirsch has configured conditional access policies for mortgage companies ranging from independent brokerages to top-50 lenders over his 25-year career in financial services IT. As CEO of Access Business Technologies, he understands the unique security challenges mortgage operations face, from field loan officers on personal devices to wire transfer fraud prevention.
10 min read
In this guide: Encompass Hosting Models Explained Infrastructure Requirements Security Configuration for Compliance Performance Optimization ...
13 min read
TRID turned ten years old in October 2025. A decade should be enough time for mortgage lenders to have their disclosure systems locked down. It...