Lock It Down: A Guide to Risk-Based Security with Microsoft Intune
Remember when office security meant locking the front door at 5:00 PM? Those days are long gone. Today, your "office" is wherever your employees...
8 min read
Justin Kirsch : Updated on February 18, 2026
Imagine you own an exclusive club. You've hired a bouncer, but instead of checking IDs or looking for dress code violations, he just sits on a stool and waves everyone in as long as they shout the password "123456." It sounds ridiculous, but that's exactly how many financial institutions treat their Microsoft 365 environments. They rely on basic passwords and maybe a splash of sporadic MFA, thinking that's enough to keep the bad actors out.
Truth bomb: it's not.
The perimeter has dissolved. There are no firewalls around your remote employees' living rooms. The only thing standing between a hacker and your member data, loan files, or wire transfer approvals is Identity. And the engine that protects that identity? That's Conditional Access.
If you're not using Conditional Access (CA) rules, you're essentially leaving your windows open while locking the front door. This guide walks you through the specific, often-overlooked Conditional Access best practices that turn your Microsoft 365 environment from a target into a fortress, and how the right partner can make implementation painless.
Think of CA as the "If This, Then That" logic for your cybersecurity. It's the intelligent decision-maker at the front door of your data. Instead of just asking, "Do you have the password?", the system asks a series of rapid-fire questions:
Based on the answers, the system makes a split-second decision to Grant Access, Block Access, or Require More Information (like an MFA prompt).
Why does this matter for financial institutions? Because static security fails. A valid username and password sold on the dark web allow an attacker to walk right in, unless CA stops them because they're logging in from an unknown device in a country where you have no employees. For credit unions subject to NCUA examination requirements, banks facing FFIEC audits, and mortgage companies under CFPB oversight, that kind of automated enforcement isn't optional. It's the brain behind the muscle of your security posture.
Many organizations enable the defaults and call it a day. But default settings are like factory settings on a router. They're designed for compatibility, not maximum security. Here are the five Conditional Access rules Microsoft 365 administrators most often miss, leaving gaping holes in their defense.
This is the single biggest backdoor in your tenant. Legacy authentication protocols (like POP, IMAP, SMTP, and older Office clients) don't support Multi-Factor Authentication (MFA). If a hacker has a password, and you allow legacy auth, they can bypass your MFA entirely. It's like having a high-tech biometric lock on your front door but leaving the doggy door wide open.
For financial institutions, this risk is amplified. Regulators expect you to demonstrate layered authentication controls. A credit union examiner finding active legacy auth protocols in your Microsoft 365 tenant will flag it as a material weakness.
The Fix: Create a CA policy that strictly blocks legacy authentication protocols. This forces all sign-ins to use modern authentication, which supports MFA. Before flipping the switch, audit your environment for legacy apps (older multifunction printers and line-of-business applications are common offenders).
Do you want an employee logging into your SharePoint containing sensitive loan data or member account records from an iPad they jailbroke to play pirated games? Probably not. Just because the user is authorized doesn't mean the device should be trusted.
The Fix: Enforce a rule requiring devices to be marked as "Compliant" in Microsoft Intune or Hybrid Azure AD Joined before accessing corporate resources. If the device isn't managed by your IT team (or ABT Guardian), it doesn't get in. For a deeper look at how managed device compliance fits into a broader endpoint strategy, see our guide on risk-based security with Microsoft Intune.
If a loan officer logs in from Denver at 9:00 AM and then someone attempts to log in with the same credentials from Lagos at 9:15 AM, something is wrong. Unless they've invented teleportation, that's an "Impossible Travel" scenario.
The Fix: Leverage Microsoft Entra ID Protection signals. Create a policy that automatically blocks or forces a password reset for sign-ins flagged as "High Risk." This uses Microsoft's threat intelligence to stop attacks you didn't even know were happening. For financial institutions processing wire transfers and ACH transactions, catching a compromised identity before it reaches your banking applications is the difference between a near-miss and a six-figure loss.
If your institution operates in North America, why is your tenant accepting login attempts from Russia, North Korea, or unauthorized regions? Most community banks, credit unions, and mortgage companies don't have employees overseas. Every foreign login attempt is noise at best and an attack at worst.
The Fix: Create a "Named Location" policy. You can either create an "Allow List" (only allowing IPs from specific countries) or a "Block List" (blocking known threat vectors). Geoblocking Conditional Access policies dramatically reduce your attack surface by filtering out noise from across the globe.
It sounds obvious, but you'd be shocked at how many tenants have "Break Glass" accounts or service accounts with Global Admin rights that bypass MFA policies for "convenience." MFA enforcement for admin accounts is non-negotiable.
The Fix: Global Admin accounts are the keys to the kingdom. If one is compromised, the game is over. Enforce a ruthless policy: No MFA, no admin access. Period. This applies to every privileged role, including Exchange Administrators, SharePoint Administrators, and Security Administrators.
Old school methods relied on firewalls and VPNs. The office network was the castle, and the firewall and antivirus were the moat and drawbridge. But today, your data lives in the cloud, and your employees are working from home offices, branch locations, and hotel rooms. The moat has dried up.
Now, Identity is your fortress. If you can't verify the identity of the person (and the health of the machine) trying to access your files, you have no security. These policies are the mortar that holds that fortress together. Without them, you're building a castle out of straw.
For financial institutions, the stakes are even higher. NCUA examiners, FFIEC auditors, and state regulators all expect to see documented access controls. CA policies give you auditable, enforceable rules that map directly to regulatory expectations around authentication, device management, and access governance.
For a closer look at this shift in security philosophy, read our post on why identity is your new fortress in Microsoft 365.
A common mistake is thinking, "We secured our email, so we're good." But Microsoft 365 is a sprawling platform. It's a complete IT ecosystem.
Your identity doesn't just unlock Outlook. It unlocks Teams chats, OneDrive files, SharePoint sites, and potentially third-party apps integrated via Single Sign-On (SSO). A breach in one area is a breach in all areas. For a mortgage company, that means loan origination documents, borrower PII, and closing disclosures all sitting behind the same identity. For a credit union, it's member account data, internal audit reports, and board communications.
By implementing comprehensive CA rules, you're not just putting a lock on the mailbox. You're securing the entire ecosystem. You're ensuring that the person accessing a confidential Teams channel is who they claim to be, on a device that hasn't been compromised.
If these rules are so important, why doesn't everyone turn them on immediately?
Two words: The Fear.
Implementing these policies can be intimidating for an internal IT person or a business owner. It's complex. One wrong click, one poorly configured "Block" rule, and you could accidentally lock the CEO out of their email during a board meeting. We call this the "Scream Test." You make a change and wait to see who screams.
Challenges include:
This complexity is why so many institutions leave the default settings on. They choose the risk of a breach over the risk of disruption. But there is a better way.
You shouldn't have to choose between security and uptime. This is where partnering with a Managed Service Provider (MSP) like Access Business Technologies (ABT) changes the equation.
We've spent 20+ years working inside the regulatory frameworks of banking, mortgage, and credit union compliance. We know that "factory settings" don't cut it for institutions subject to NCUA, FFIEC, or CFPB oversight. That's why we built Microsoft 365 Guardian.
Guardian isn't just a tool. It's a lifecycle. We start with Hardening (setting up these exact rules correctly the first time). We move to Monitoring (watching for risky sign-ins 24/7). We provide Insights and Response.
When you work with a Tier 1 CSP like ABT, you get the expertise to implement these Conditional Access best practices without the "Scream Test." We know how to identify legacy apps before they break. We know how to whitelist specific secure IPs. We ensure that your move to Microsoft 365 Identity, Access, and Endpoint Security is smooth, compliant, and invisible to your users until it stops a hacker in their tracks.
The days of setting up a server in a closet and manually installing antivirus software are over. The modern threat environment requires a sophisticated, layered defense. It's one of the most powerful tools in the Microsoft 365 arsenal, but it's useless if it sits deactivated out of fear or lack of expertise.
By enabling rules like blocking legacy auth, requiring managed devices, and geoblocking, you're actively hardening your Microsoft 365 security posture. You're telling attackers that your institution isn't an easy target.
But you don't have to be an expert in Entra ID or Intune. That's our job. With ABT and our Microsoft 365 Guardian platform, you get enterprise-level security, compliance, and intelligence. We turn the Microsoft cloud into a secure foundation for your institution so you can focus on serving members, borrowers, and depositors instead of chasing security alerts.
Let us handle the bouncer duties. You enjoy the club.
Talk to an ABT security expert to get your CA policies reviewed, or run a free security assessment to see where your Microsoft 365 tenant stands today.
No. Conditional Access is included in Microsoft 365 Business Premium, which is the standard license ABT recommends and deploys for financial institutions. If your organization is on Business Standard or Basic, you are missing these security features. Upgrading to Business Premium is typically the first step ABT takes when onboarding a new institution.
Not if configured correctly. Conditional Access is designed to allow access when conditions are met, such as the correct user on a managed device from an approved location, and block it when they are not. ABT designs policies specifically to support secure remote work at credit unions, banks, and mortgage companies without disrupting daily operations.
MFA is a strong control, but it can be bypassed through legacy authentication protocols or worn down through MFA fatigue attacks where users blindly approve prompts. Conditional Access acts as the decision engine that determines when to require MFA, when to block access entirely, and when to force a password reset based on real-time risk signals.
Conditional Access policies create documented, enforceable access controls that map directly to regulatory expectations from NCUA, FFIEC, and CFPB examiners. Each policy generates audit logs showing who accessed what, from where, and on which device. This gives your compliance team evidence of systematic access governance during examinations.
The biggest risk is misconfiguration that locks out legitimate users, including executives, during business-critical moments. A poorly scoped block rule can disable access for an entire department. Working with an experienced partner like ABT means policies are tested in report-only mode first, legacy dependencies are identified upfront, and rollout happens in stages.
Remember when office security meant locking the front door at 5:00 PM? Those days are long gone. Today, your "office" is wherever your employees...
For decades, cybersecurity was conceptually simple. Medieval architecture applied to digital real estate. You built a castle (your office network),...
The Hidden Risks Lurking in “Set-and-Forget” Security Many organizations assume that once they’ve purchased Microsoft 365 or Azure licenses and...