Please note that this simulation does not give the exact result.
In fact, users first go through the proxy service, which also has access rules through its ACLs, its identification system...
It simply allows you to validate whether or not a user or group of users is filtered through your url filtering rules.