Host:
HTTPS:
You can also access this page from following domains
edgedbg.com
HTTPSHTTP
sub.edgedbg.com
HTTPSHTTP
lab.eastasia.cloudapp.azure.com
HTTPSHTTP
IE Security Zones test domains
Internet Explorer assigns all websites to one of four security zones: Internet, Local intranet, Trusted sites, or Restricted sites. The zone to which a website is assigned specifies different security settings that may lead to different behaviors. Following domains allow you to test the browser labs in different security zones in IE. Before navigating to following domains, you need to either map these domains into the correct security zone manually or run following command to map these domains automatically.
powershell -nop -c "iex(New-Object Net.WebClient).DownloadString('http://edgedbg.com/files/iemap.ps1')" CopiedCopy failed, please copy the command manually
internet.edgedbg.com
HTTPSHTTP
sub.internet.edgedbg.com
HTTPSHTTP
trusted.edgedbg.com
HTTPSHTTP
sub.trusted.edgedbg.com
HTTPSHTTP
intranet.edgedbg.com
HTTPSHTTP
sub.intranet.edgedbg.com
HTTPSHTTP
Fork me on GitHub

Authentication Scripts

Prerequisites

  1. Download the file at https://cesdiagtools.blob.core.windows.net/windows/Auth.zip, and unzip it.

  2. Please ensure that the execution of PowerShell scripts is enabled. If you're unsure whether script execution is enabled, open PowerShell and run the following command: Get-ExecutionPolicy. If the result is RemoteSigned, Unrestricted, or Bypass, then script execution is enabled regardless of whether your system is a Windows Client or Windows Server. If your system is Windows Server and the result is Default or Undefined, then PowerShell script execution is also enabled. In any other scenario, script execution in PowerShell is prohibited. If you want to enable PowerShell script execution, please refer to the steps below:

    1. Run PowerShell as an administrator and execute following command to set the PowerShell ExecutionPolicy to RemoteSigned. This will allow PowerShell to execute scripts.

      Set-ExecutionPolicy -ExecutionPolicy RemoteSigned
      

      If you encounter any errors with the execution of the above command, please proceed with the steps below:

      • To allow script execution in Windows PowerShell, execute following commands in an elevated CMD or PowerShell window:
        REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell /v EnableScripts /t REG_DWORD /d 1 /f
        REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell /v ExecutionPolicy /d "RemoteSigned" /f
        
      • To allow script execution in PowerShell Core (Cross-platform PowerShell), execute following commands in an elevated CMD or PowerShell window:
        REG ADD HKLM\SOFTWARE\Policies\Microsoft\PowerShellCore /v EnableScripts /t REG_DWORD /d 1 /f
        REG ADD HKLM\SOFTWARE\Policies\Microsoft\PowerShellCore /v ExecutionPolicy /d "RemoteSigned" /f
        
      • After restarting PowerShell, these changes will take effect.

Main steps

  1. Open an elevated PowerShell command prompt and navigate to the location where you unzipped Auth.zip.

  2. Run .\start-auth.ps1 to begin tracing. Wait until you see the message: The tracing has now started..

    • If it is the first time the script has been run on this device, you will be prompted to accept a EULA.

End steps

  1. Return to the elevated PowerShell command prompt where you ran .\start-auth.ps1, and run .\stop-auth.ps1 to stop tracing.
  2. All logs will be saved in an authlogs folder inside the same location where you unzipped Auth.zip. Please zip the authlogs folder and name it authlogs.zip.