A PowerShell connectivity testing tool for Azure and Microsoft services. MicCheck validates web accessibility to 250+ Azure and Microsoft domains across HTTP and HTTPS protocols, helping identify network blocks, proxy issues, and firewall restrictions.
- Comprehensive Testing: Tests connectivity to 250+ Microsoft and Azure domains
- Dual Protocol Support: Validates both HTTP (port 80) and HTTPS (port 443) access
- Proxy Detection: Identifies proxy authentication requirements and proxy-level blocks
- Web Filter Detection: Detects 403 Forbidden responses and HTTP-level filtering
- Timeout Handling: Configurable timeout settings with clear timeout indication
- Color-Coded Output: Visual feedback with green (success) and red (failure) indicators
- Statistical Summary: Percentage-based success rates and failure counts
MicCheck validates connectivity to:
- Azure Portal & Management endpoints
- Azure Storage (Blob, File, Queue, Table)
- Azure AI & Cognitive Services (including OpenAI)
- Azure Databases & Data Services
- Azure DevOps & Visual Studio Services
- Azure Container Services
- Azure Networking & CDN
- Microsoft 365 Admin Centers
- Exchange Online & Outlook
- SharePoint Online & OneDrive
- Microsoft Teams
- Office CDN & Update Services
- Azure Active Directory
- Microsoft Identity Platform
- Graph API endpoints
- OAuth & OIDC services
- Power Apps
- Power BI
- Power Automate (Flow)
- Power Virtual Agents
- Windows Update & Activation
- Microsoft Store
- Microsoft Defender
- Dynamics 365
- Intune & Endpoint Manager
- GitHub & Package Managers
- Operating System: Windows with PowerShell 5.1 or later
- Permissions: Standard user permissions (no admin required)
- Network: Internet connectivity
- Download
MicCheck.ps1to your local machine - Open PowerShell (no admin privileges needed)
- Navigate to the directory containing the script
cd C:\path\to\MicCheck.\MicCheck.ps1If you encounter execution policy restrictions, use one of these methods:
Option 1: Bypass for single execution
powershell -ExecutionPolicy Bypass -File .\MicCheck.ps1Option 2: Unblock the file
Unblock-File .\MicCheck.ps1
.\MicCheck.ps1MicCheck provides real-time color-coded output:
======================================
Azure/Microsoft Web Connectivity Test
======================================
Testing HTTP/HTTPS access to 250 domains
Tests for web proxy blocks and HTTP-level filtering
Timeout: 5s per test
Start time: 2025-10-10 10:30:00
======================================
Testing: portal.azure.com
HTTP... ✓ PASS [200]
HTTPS... ✓ PASS [200]
Testing: login.microsoftonline.com
HTTP... ✓ PASS [200]
HTTPS... ✓ PASS [200]
...
======================================
SUMMARY
======================================
Total domains tested: 250
Total tests: 500
HTTP (Port 80):
Accessible: 230 (92.0%)
Blocked/Failed: 20
HTTPS (Port 443):
Accessible: 245 (98.0%)
Blocked/Failed: 5
End time: 2025-10-10 10:35:00
======================================
- ✓ PASS [code]: Successfully connected (shows HTTP status code)
- ✗ TIMEOUT: Request timed out (possible firewall block)
- ✗ PROXY: Proxy authentication required or proxy block
- ✗ 403: Forbidden - blocked by web filter
- ✗ FAIL: Other connection failure
Edit the timeout value at the top of the script (default: 5 seconds):
# Timeout for connectivity tests (seconds)
$timeout = 5Increase for slower networks or decrease for faster testing.
Quickly identify which Microsoft/Azure services are accessible from your network location.
Validate that required Microsoft services are reachable through corporate firewalls and proxies.
Confirm that necessary domains are whitelisted for Microsoft 365 and Azure services.
Detect proxy blocks and authentication issues affecting Microsoft service connectivity.
Test network readiness before migrating to Azure or Microsoft 365.
Your network has good connectivity to Microsoft services. Minor failures may be expected for deprecated or geo-specific services.
Some services are blocked. Review firewall rules and proxy configurations. Common causes:
- Web proxy authentication requirements
- Category-based web filtering
- Incomplete firewall whitelist
Significant network restrictions detected. Possible causes:
- Aggressive firewall policies
- Proxy server blocks
- DNS resolution issues
- Geographic restrictions
- Network isolation policies
- Cause: TLS inspection or certificate validation issues
- Solution: Check proxy SSL/TLS settings and certificate trust
- Cause: Proxy authentication not configured in PowerShell
- Solution: Configure proxy credentials or test from non-proxy network
- Cause: Firewall blocking connections at network level
- Solution: Review firewall rules and add required domains to whitelist
Contributions are welcome! Please feel free to submit issues or pull requests with:
- Additional domains to test
- Bug fixes
- Feature enhancements
- Documentation improvements
This project is provided as-is for network connectivity testing purposes.
This tool performs HTTP/HTTPS connectivity tests only. It does not:
- Store or transmit any data
- Modify system settings
- Require administrative privileges
- Access sensitive information
Use this tool in accordance with your organization's security and network testing policies.
Maintained by the HackAndBackpack team.