You're correct that this works for the default Internet Explorer AppContainer, and you're also correct to note that this is a bit fragile because the AppContainer name may be different in the future. Also, I don't think Microsoft has ever documented this, but even IE10 may also have an AppContainer of a different name. That can occur if the user visits a site on their "private network" using an Internet-Zoned address and uses the notification bar to load the page in a "less restrictive" AppContainer. At that time, a new AppContainer is created to handle that site. I can't recall whether that AC is named windows_ie_ac_002 or something else.
One approach to be as robust as possible would be to use the Firewall APIs described in my post to exempt any AppContainers belonging to IE.
Also note: If your installer changes the user's PC's security posture, you absolutely must inform them of that fact. Microsoft could choose to block your application as malware otherwise.