After enabling both blocking features, perform a comprehensive verification to ensure your security configuration is active and functioning correctly.
Check the final status of all directory synchronization features:
Get-EntraDirSyncFeature | Where-Object {$_.FeatureName -like '*Block*'} | Format-Table FeatureName, Enabled -AutoSize
This filtered view shows only the blocking-related features for easy verification. Both should display True in the Enabled column.
If you have Entra Connect running, trigger a manual synchronization to test the new behavior:
# Run this on your Entra Connect server
Start-ADSyncSyncCycle -PolicyType Delta
Monitor the synchronization logs for any changes in behavior. With blocking enabled, you should see:
- No automatic soft matching of objects based on UPN or email
- Rejection of hard match attempts that would result in object takeover
- Clear error messages if legitimate matching attempts are blocked
Pro tip: Set up monitoring alerts for Entra Connect synchronization errors. With blocking enabled, legitimate migration attempts will generate specific error codes that you can use to identify when temporary unblocking might be needed.
Verification: Check Entra Connect synchronization reports and ensure no unexpected object linking occurs during the next sync cycle.