Now you need to thoroughly test your blocking configuration to ensure it works as expected while not breaking legitimate functionality.
Perform these verification tests on a target device:
Test 1: Web Browser Blocking
- Open Microsoft Edge
- Navigate to:
https://apps.microsoft.com - Expected result: Block page with your custom message
- Try:
https://get.microsoft.com - Expected result: Same block page
Test 2: Direct App Links
# Test these URLs in Edge:
https://apps.microsoft.com/detail/9NBLGGH4MSV6
https://www.microsoft.com/store/apps/9WZDNCRFJ3Q2
https://get.microsoft.com/installer/download/9NBLGGH4MSV6
Test 3: Verify Store App Updates Still Work
- Open Microsoft Store app (Start > Microsoft Store)
- Click your profile icon > Downloads and updates
- Click Get updates
- Verify updates download and install normally
Test 4: Check Policy Application Status
Run these PowerShell commands on the test device:
# Check Intune policy sync status
Get-MpComputerStatus | Select-Object AMEngineVersion, AMProductVersion
# Verify AppLocker policy
Get-AppLockerPolicy -Effective | Select-Object -ExpandProperty RuleCollections
# Check Edge policy application
Get-ItemProperty "HKLM:\SOFTWARE\Policies\Microsoft\Edge" -Name URLBlocklist
Warning: If Store updates fail during testing, immediately check if your URL patterns are too broad. Store updates use different endpoints than web installer downloads.
Verification: Document successful blocks in a test log. Ensure legitimate Microsoft services (Office 365, Teams, Windows Update) continue working normally. If any issues arise, refine your URL patterns to be more specific.