Thomas Verheyden
Specialized in cyber threat protection and detection in hyrbrid environments
๐ Biography
With over 15 years of experience in the IT industry and a strong focus on cybersecurity for the past 8 years, I specialize in cyber threat protection and detection across both cloud and on-premises environments. My passion lies in helping organizations build resilient security architectures that not only defend against modern threats but also enable secure digital transformation. Throughout my career, I’ve worked closely with clients across various sectors, delivering strategic guidance and hands-on expertise in areas such as threat detection, incident response, and cloud security. I’m particularly driven by the evolving threat landscape and the opportunity to continuously learn, share knowledge, and contribute to the security community.
โจ High-Impact Contributions 3
A user-friendly graphical interface for managing Microsoft Defender for Identity (MDI) configurations using PowerShell. This PowerShell script provides a comprehensive WPF-based GUI wrapper around the Microsoft Defender for Identity PowerShell module. It simplifies the configuration, testing, and management of MDI deployments through an intuitive interface, eliminating the need to remember complex PowerShell commands.
Microsoft recently announced that device isolation exclusions in Defender for Endpoint are now generally available. This made me think about possible use cases for this new feature. Together with Bjorn Claes, we explored whether it’s possible to exclude the Intune wipe process from isolation mode. If this works, it would allow us to remotely wipe devices using Intune while keeping them in isolation mode within Defender for Endpoint.
This tool is designed to assist you in analyzing issues related to Defender for Endpoint on your local endpoint. It offers a centralized view of the security configuration, log files, updates, and provides access to the Performance Analyzer.