Liam Cleary


X Twitter

Liam began his career as a computer trainer. He quickly realized that programming, breaking and hacking were much more fun. Liam spent the next few years working within core infrastructure and security services. He is now the founder and owner of SharePlicity, a consulting company focusing on Microsoft 365 and Azure technology. His role within SharePlicity is to help organizations implement Microsoft 365 and Azure technology to enhance internal and external collaboration, document, and records management, automate business processes, and implement security controls and protection. He is a long-time Microsoft MVP and Microsoft Certified Trainer, focusing on architecture, security and crossing the boundary into software development. Over the past few years, his specialty has been security in Microsoft 365, Azure and its surrounding platforms. Liam also creates online training courses for Pluralsight, LinkedIn Learning and Cloud Academy, and he teaches multiple Microsoft certification courses for Opsgility and Microsoft. You can find him at user groups and conferences, teaching classes, offering advice, spending time in the community, teaching his kids how to code, raspberry PI programming, hacking the planet, building Lego robots, or coaching soccer. You may also find him running races in the dark, hiking, or mountain biking at breakneck speeds.

Published by Liam Cleary

Enhancing Microsoft 365 Security with Conditional Access and Multifactor Authentication

- 10 min read-Liam Cleary
Businesses face challenges in maintaining data integrity and protecting sensitive information. Microsoft 365's advanced security features, Multifactor authentication (MFA), and Conditional Access are crucial components of a comprehensive security strategy. Multifactor Authentication requires multiple forms of user verification before granting access, while Conditional Access enables granular access controls. Together, they create a dynamic security fabric that anticipates modern cybersecurity threats and ensures rigorous safeguarding of data and applications.

Strategies for Securing Sensitive Information in Microsoft Teams

- 6 min read-Liam Cleary
The role of Microsoft Teams has grown significantly over the past few years. Its seamless integration of chat, video conferencing, file sharing, and various productivity tools has become a popular platform for companies of all sizes. However, this increased usage also means a higher risk of exposing sensitive data.

Data Loss Prevention Strategies in Microsoft 365

- 9 min read-Liam Cleary
Microsoft 365 provides robust Data Loss Prevention (DLP) strategies to prevent unauthorized access, misuse, or transfer of sensitive data. Microsoft 365's user-friendly interface simplifies the management of DLP policies. Customized DLP policies created using the compliance center classify data based on sensitivity, communicate guidelines organization-wide, and adapt to evolving data protection needs. In this article, learn guidelines about steps to take before you create DLP policies, which goals to set, and define success criteria, then learn tips for how to create DLP policies and how to roll them out.

Managing Microsoft 365 with the Microsoft Graph PowerShell SDK

- 8 min read-Liam Cleary
Microsoft Graph PowerShell SDK can streamline your workflow and improve your overall efficiency in managing Microsoft 365. Here, we cover Graphs’s PowerShell SDK setup, authentication, and various administrative tasks, such as managing users, groups, mail, calendars, and Microsoft Teams.

Data and Security Breach Within Microsoft 365

- 11 min read-Liam Cleary
Data and security breaches within Microsoft 365 can have severe financial and reputational consequences for organizations, making robust data protection strategies imperative. To identify and respond to breaches, organizations should monitor user activities and system alerts, regularly audit security logs, and seek expertise when needed. Liam offers some best practices.

Tweaking the Modern Script Editor Web Part

- 3 min read-Liam Cleary
You all know that a modern script editor web part is available within the PnP Samples that allows you to write code directly into the web part as you did for on-premises versions of SharePoint. Remember, it is a sample; if you don’t need it, don’t use it. As it is sample code, you need to compile it yourself.

Microsoft 365: A Tale of Online Security – Chapter 3

- 3 min read-Liam Cleary
Chapter 3: The Forensic Expert. Jake and Lily contacted Max, the forensic expert, and told him about the phishing email and their discovery of the hackers in Mr. Johnson's Office 365 Tenant. Max was intrigued and eager to help. He knew that time was of the essence and that they had to act quickly to prevent further damage.

Microsoft 365: A Tale of Online Security – Chapter 2

- 3 min read-Liam Cleary
Chapter 2: Inside the Tenant. Jake and Lily quickly changed their passwords and alerted Mr. Johnson about the phishing email. They knew they had to act fast to prevent further damage to the Office 365 Tenant. Grateful for their help, Mr. Johnson permitted them to investigate the Tenant and check for any compromises.

Microsoft 365: A Tale of Online Security – Chapter 1

- 2 min read-Liam Cleary
Chapter 1: The Phishing Email. Jake and Lily sat in their computer lab, typing away on their laptops. They loved to explore the digital world and see what they could find. Today, they looked for vulnerabilities in Microsoft 365, the popular cloud-based productivity suite.

Used Microsoft 365 Defender Advanced Hunting for Querying Custom Log Data

- 6 min read-Liam Cleary
Microsoft 365 Defender Advanced Hunting uses the Kusto Query Language (KQL) and information within Microsoft 365 to identify potential risks. Once licensed, most tenants will see tables with varying types of data that you can query or join together.

Execute Advanced Hunting Queries Using PowerShell

- 2 min read-Liam Cleary
This time we combine Advanced Hunting Kusto Query Language (KQL) queries and Microsoft PowerShell Graph SDK. We will use the same Advanced Hunting Kusto Query Language (KQL) as before: The PowerShell is also mostly the same with a few changes.

Finding Emails Using Microsoft 365 Defender Advanced Hunting Queries

- 4 min read-Liam Cleary
While working on some training course assets, I needed to execute “Advanced Hunting” queries from PowerShell. The logic is to get the results and then use advanced PowerShell capabilities for further analysis.