Enforcement is step 2. Proxy with a blacklist of hostnames would do, but unfortunately, with encrypted SNIs on the horizon, full blown https proxy with custom CA enrolled on all machines would be necessary.
Step 1 is a mechanism for those, who do not want to fight the network policy, just want the autoconfiguration.