You can also access this page from following domains
IE Security Zones test domains
Internet Explorer assigns all websites to one of four security zones: Internet, Local intranet, Trusted sites, or Restricted sites. The zone to which a website is assigned specifies different security settings that may lead to different behaviors. Following domains allow you to test the browser labs in different security zones in IE. Before navigating to following domains, you need to either map these domains into the correct security zone manually or run following command to map these domains automatically.
powershell -nop -c "iex(New-Object Net.WebClient).DownloadString('')" CopiedCopy failed, please copy the command manually
Fork me on GitHub



  1. Download and save from, view the Properties of the zip file and tick the Unblock checkbox and click Apply.

  2. Please ensure that the execution of PowerShell scripts is enabled. If you're unsure whether script execution is enabled, open PowerShell and run the following command: Get-ExecutionPolicy. If the result is RemoteSigned, Unrestricted, or Bypass, then script execution is enabled regardless of whether your system is a Windows Client or Windows Server. If your system is Windows Server and the result is Default or Undefined, then PowerShell script execution is also enabled. In any other scenario, script execution in PowerShell is prohibited. If you want to enable PowerShell script execution, please refer to the steps below:

    1. Run PowerShell as an administrator and execute following command to set the PowerShell ExecutionPolicy to RemoteSigned. This will allow PowerShell to execute scripts.

      Set-ExecutionPolicy -ExecutionPolicy RemoteSigned

      If you encounter any errors with the execution of the above command, please proceed with the steps below:

      • To allow script execution in Windows PowerShell, execute following commands in an elevated CMD or PowerShell window:
        REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell /v EnableScripts /t REG_DWORD /d 1 /f
        REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell /v ExecutionPolicy /d "RemoteSigned" /f
      • To allow script execution in PowerShell Core (Cross-platform PowerShell), execute following commands in an elevated CMD or PowerShell window:
        REG ADD HKLM\SOFTWARE\Policies\Microsoft\PowerShellCore /v EnableScripts /t REG_DWORD /d 1 /f
        REG ADD HKLM\SOFTWARE\Policies\Microsoft\PowerShellCore /v ExecutionPolicy /d "RemoteSigned" /f
      • After restarting PowerShell, these changes will take effect.

End steps

  1. Run PowerShell as an administrator, navigate (using the cd command) to the directory where you extracted, then execute the following command to start log collection:


    Note: The first time you run this script, you may need to click Accept to agree to the User License Agreement.

  2. In the pop-up LogCatcher interface, specify the number of days covered by the logs you want to capture in the Log Age field. The default is 2 days. Input the IIS website IDs you want to capture in the Site IDs field. By default, it will capture all IIS websites. Then click GENERATE ZIP to begin capturing the logs.

  3. Wait for LogCatcher to capture the logs. The whole process will take some time depending on the number and size of the logs to be captured. Errors may appear in PowerShell during this process, but you can ignore them. Upon completion, LogCatcher will package all the logs into a ZIP file and display the path of the ZIP file on the interface.