Attackers target identities, devices, apps, and data at every layer — and traditional perimeter security simply can’t keep up. To protect your environment, you must verify every access request, every time, using all available context. These ideas underpin the principle of Zero Trust and its “verify explicitly” pillar.
This guide explains how to implement the Verify Explicitly pillar of Zero Trust in Microsoft 365, where Microsoft’s native tooling falls short, and how platforms like CoreView can help close the gaps and operationalize Zero Trust at scale.
This article covers:
Executive Summary
Achieving the Zero Trust principle of Verify Explicitly in Microsoft 365 requires more than enabling MFA or creating basic Conditional Access policies. This guide explains the full, phased approach needed to secure identities, devices, applications, and data using Microsoft’s native capabilities, including Conditional Access, Intune, Purview, and continuous risk-based verification. It also highlights where Microsoft’s guidance leaves practical gaps in visibility, entitlement governance, least-privilege access, and multi-tenant oversight. Finally, it outlines how CoreView strengthens Zero Trust programs through unified entitlement visibility, operator access controls, drift detection, and continuous assurance to maintain a strong and scalable security posture.
The Zero Trust security model is built on three core principles: Verify explicitly, Use least privilege, and Assume breach. In the context of a Microsoft 365 environment, Microsoft provides an official deployment plan (“Zero Trust deployment plan with Microsoft 365”) that maps these principles to capabilities across identity, devices, apps, data, AI agents and compliance.
For organizations using Microsoft 365 (and hybrid or cloud-only identity via Microsoft Entra ID / Azure AD), achieving “verify explicitly” means ensuring that every access request — wherever it originates, from whichever device or user — is evaluated by strong authentication, device health, compliance posture, contextual signals, and that the access to apps and data is appropriately authorized.
Microsoft’s guidance is solid, but in practice there are gaps — especially around governance, visibility, entitlement sprawl, and least privilege access. These are areas where CoreView can step in.
The “verify explicitly” principle, according to Microsoft, is supported by a set of capabilities in Microsoft 365 across identity, device, applications, data and sessions.
This means, in practice:
“Verify explicitly” boils down to a handful of key capability areas:
How can you implement the “verify explicitly” mandate in Microsoft 365? Once you have secured the appropriate license (Entra ID P2, Microsoft 365 E5, Intune, etc.) for full features, there are a number of key steps you can take.
While Microsoft’s guidance and tools provide a strong foundation for “verify explicitly”, there are several practical gaps and challenges enterprises face. Below are key areas where Microsoft’s native coverage may fall short — and how CoreView adds differentiated value.
In Microsoft 365, Entra ID and Azure provide RBAC and Privileged Identity Management (PIM) capabilities, but organizations often struggle with effective entitlements, wildcard permissions, delegated admin privileges, guest user permissions, and service-principal (app) permissions. For example, academic research shows that wildcard over-reach in Azure RBAC is common (a study found ~39 % of actions via wildcards have cross-resource over-reach).
Microsoft’s guidance emphasizes the need for access reviews and least privilege but does not always make it easy to access the real-time state of all privileges, especially across multiple tenants or delegated/service accounts.
In these cases, solutions like CoreView provide discovery and visibility capabilities across Microsoft 365, for example with mailbox permissions, SharePoint/OneDrive access, Teams roles, guest accounts, Entra ID roles, delegated admin roles. It can provide insight into privilege creep and identify stale or redundant privileges. All of these enable stronger claims to the “Verify explicitly” principle by verifying who has what rights before access is granted, especially for admin or privileged access.
Setting up least-privilege administrative models in Microsoft 365/Azure can be complex: splitting roles, scoping access, applying Just-In-Time (JIT) access, timing expiry, combining with device compliance and conditional access. Microsoft provides PIM, but for functional/operator access tasks (e.g., mailbox creation, Teams channel management) there is less native granular check-box style control and scoping.
Microsoft alludes to trade-offs and manual work involved in this in its own materials.
An operator access model, such as that provided in CoreView lets organizations define functional roles, e.g., “create mailboxes”, “manage team settings”), assign them on a check-box basis, scope the assignment (e.g., virtual tenant, OU, location), set start/end dates and enforce expiry. This reduces standing privileges and enables auditing.
Enabling Conditional Access, device compliance, and app protection are essential, but organizations may still face configuration drift: policies changed, devices removed from compliance, unmanaged guests added, legacy authentication re-enabled.
Monitoring and enforcing that your “verify explicitly” controls remain active over time requires additional governance, scheduled reviews, alerts and audit. Microsoft surfaces audit logs and Secure Score, but bridging that to operational remediation is often not turnkey.
With solutions like CoreView, enterprises gain easy access to governance dashboards over Microsoft 365, enabling drift detection, visibility into orphaned guest accounts, inactive admin roles, device compliance failures, “what-ifs” for permissions, and scheduled reviews.
Many organizations (or managed service providers) operate in multi-tenant environments, delegated admin privileges (DAP), cross-tenant access, or global service provider relationships. Microsoft tools are orientated to each tenant individually; getting a unified view of “verify explicitly” across multiple tenants, administrative consents, delegated roles, service provider access is more manual. Native Microsoft tooling to govern cross-tenant or delegated roles needs to gain more maturity before it can be considered completely reliable.
Today, solutions like CoreView support multi-tenant management: you can roll up permissions across tenants, view delegated admin, service provider access, DAP assignments, guest/ B2B relationships.
Microsoft provides DLP, sensitivity labels, session controls and machine risk signals. However, detecting anomalous data access, entitlements over time, credential misuse, lateral movement (post access) still often requires integration with XDR/SIEM, additional tooling or manual analysis.
The “assume breach” principle of Zero Trust touches this ,but the “verify explicitly” moment needs to cover after access too (ongoing verification). Microsoft’s documentation stresses what other experts echo: “Zero Trust is a security strategy … not a product or service”, and you need visibility to drive threat detection.
CoreView brings continuous analytics around operations in Microsoft 365: unusual mailbox permission changes, Teams channel admin assignments, SharePoint external share links, guest access growth, service-principal escalations. With automatic alerts and remediation workflows, you can enforce ongoing verification of access and data movement — closing the gap between “access granted” and “access misused”.
Microsoft’s Zero Trust deployment plan for Microsoft 365 provides a robust framework for “verify explicitly” (authenticate and authorize based on all available signals).
Nevertheless, practical implementation in a complex enterprise Microsoft 365 environment reveals gaps in visibility, entitlement governance, least-privilege operator models, governance/detection of drift, cross-tenant oversight and data-level anomaly verification.
CoreView offers complementary capabilities that fill those gaps — enabling stronger “verify explicitly” enforcement, operationalizing least privilege, continuous assurance, cross-tenant visibility and data-centric monitoring.
Implementing the “Verify explicitly” pillar of Zero Trust in a Microsoft 365 environment is absolutely achievable — Microsoft gives you the blueprint and tools. The challenge lies in operationalizing it at scale, maintaining it over time, covering entitlements, governing rights, monitoring drift, and applying the model across users/devices/apps/data combinations.
By combining Microsoft’s native controls (MFA, Conditional Access, Intune, Purview, etc) with CoreView’s governance, entitlement visibility, operator access management and continuous assurance capabilities, you can elevate your Zero Trust posture from “enabled” to enforced.
Read why analyst Kuppinger Cole recommends CoreView to secure your Microsoft 365 identities.