Skip to main content
An interruption in email can bring business to a standstill.
​We have several Email Common Troubleshooting steps below.  However, if you are experiencing a business stopping email issue please reach out to Lowcountry Computing by calling our office at 843-766-9268.

Many business expect email to operate as reliably as a phone call. That's like comparing a 3 legged race to a relay race. 


On the phone, like in a 3 legged race you know if your directly connected partner is not performing. However, in email an a relay there are multiple handoffs and you are not sure your next partner is ready until that stage of the relay.


The best troubleshooting starts with a well documented messaging structure.  We can help with that documentation, after we get your email working.

A good first step is to confirm your service provider is not experiencing an outage.
These outages would effect more than a single user or message.
See 'Status of Cloud / Hosted Services' in next section or steps in Email Common Troubleshooting steps.​

"In the cloud"

Know your hosted supply chain, understand which cloud providers you depend on—and where potential disruptions will occur.

Microsoft 365 Network Connectivity

Google Cloud Status

AWS Service Health Dashboard

Cloudflare Status

Cisco Cloud Services Status

User reported ISPs and Cloud outages

Downdetector (Crowdsourced)

Provided by ThousandEyes.com
Cisco Thousand Eyes logo

Thousand Eyes by Cisco provides current and historical service provider outages.

Customized information requires a subscription

Diagram showing Registrar, DNS, Web Hosting, EMail Hosting & SPF/DKIM/DMARC, and Other records
Microsoft Excel Icon

Looks like a good place 
for a spreadsheet

Have the account data when it's needed. 

Domain Registrar lookup - ICANN
Your Domain Name 'who is' information & registrar
Name Server (DNS) - records pointing to web site / email / others
Web Host
Email Host
Other Services
Email Security Protocols

I got a suspicions thing here, scan it first. 

Virus Total logo

Analyze suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.

Send To > VirusTotal can be put on windows menu, if you find your self using it a lot.

https://www.virustotal.com

Clean Talk logo and link

Website Malware Scanner & Security Check

No detected issue, dig deeper on this web site.

Deep website/URL analysis

Submits a URL to a browser-like sandbox and records all network requests, resources, DOM, JavaScript variables, cookies, and a screenshot.
Excellent for showing what a link actually does even if AV engines do not yet flag it.

Get IP address and geographic location of hosting servers.

CompleteDNS.com logo and link

Three free lookups per day, showing DNS changes and age of domain.

It shows clean but something is up...

Little white figure with tool box, checking on computer with sick face

If your are not the daily IT person with experience in diagnostic and remediation, I strongly suggest you contact your internal IT or Lowcountry Computing.

This is a quick fix band aid, let's talk prevention. - call Lowcountry Computing 843-766-9268

Remove malware from PC no install, just download exe and run scan only.

CAUTION this could remove false positive files!

https://www.eset.com/us/download/tools-and-utilities/

Internet Speed Test

There are a lot of speed test available online, and you may have different results from different providers.  We believe the process should be advertisement free, you are testing speed because you already have issues, you do not need to download more problems.

Google Internet Speed Test - just the numbers

Cloudflare Speed Test - Quality Score

LowCo Speed Test - basic not SSL

Provided by OpenSpeedtest.com

12-16 characters

M1x ch@racter types!

#3adopt-LONG- passphrases

unique passwords for every account

password manager

multi-factor (MFA)

Email Common Troubleshooting

It's not me it's you... what we are thinking.

These tools work best when the address with a delivery issue is on a private domain (@company.com) not a public domain (gmail.com, apple.me, yahoo.com, comcast.net).

Public domains are controlled by the provider and service a large range of email accounts.

Most blacklist removals involve resolving the cause and waiting.   Most common way to end up on a black list is mass-mail sent from your domain.

#1 Check SPAM / JUNK folders, if there a daily quarantined report check with that service also.

Most common way to end up in spam is to have your email domain misconfigured be part of an email domain that has sent email tagged as spam by the receivers. 


#2 Domains are tied to one or more IP addresses, those addresses may be on blacklist that prevents the delivery of email.

There is no one blacklist, multiple companies provide the service as subscription to mail providers and companies,  the tools listed will check multiple blacklist services.  Instructions on getting removed from blacklist is provided on each of the scanning sites.  

link and logo for DNSChecker.org
Logo and link for MXToolBox
Logo and link CleanTalk.org
Logo and link to Site24x7.com by ManageEngine

You are the sender of the email. 

If you receive a message back with a failure reason, it's not always clear as to why.  Copy the contents of the returned message and paste into tool to analyze the message.  The tool will explain the reason for the return to sender.

MXX Toolbox Bounce Back Checker

You are the receiver of the email.

MXX Toolbox Bounce Back Checker

At the end of securing your email you will receive an email with success and failed emails you or we will receive a lot of emails with success and failure reports.

Sender Policy Framework (SPF) acts like a pre-approved guest list, verifying that the server sending the email is on the authorized list for that domain.


DomainKeys Identified Mail (DKIM) is a digital "tamper-proof seal" that uses a cryptographic signature to prove the message hasn't been altered since it was sent.


Domain-based Message Authentication, Reporting, and Conformance (DMARC) is the ultimate set of instructions; it looks at the SPF and DKIM results and tells the receiving server exactly what to do—acceptquarantine, or reject—if the "guest list" or "seal" doesn't check out

    Google, Microsoft, Yahoo, Apple, and many corporate email domains require SPF and some require DKIM to send email to their domains.  If your email is not being delivered or not delivered without being whitelisted, then this sections is for you.

    Diagram showing sender using SPF for trusted IP, DKIM for digital signature, and DMARC to instruct receiving server what to do with non-matching emails
    ​Email Authentication:
    ​A Documented Security Process, Not a Break‑Fix
    EasyDmarc logo and link

    SPF, DKIM, & DMARC tools below and associated cookies are part of partnership with easydmarc.com

    SPF- purely logical, authorized messengers

    Over 10 DNS Lookups can effect how deliverable your emails are.  Often SPF is edited by marketing, email, contacts, and other business tools do not take into consideration all of the other senders for your domain.   This can cause delivery issues that no one person owns.  

    A good indicator is the phrase "None of our other clients are having this problem".


    If you are having a email delivery issue impacting your business contact Lowcountry Computing.  We will resolve the issue and then show you what we did.  


    It's hard to teach a hungry man to fish, sometimes you have to feed then teach.

    DKIM -  V for verified 

    Your domain can and often should have multiple unique selectors.  Each selector is for a unique email connected resource.  Run the test first for all selectors.  You should know what these selectors are for security and sanity.


    Microsoft Excel icon
    This looks like a good place for a spreadsheet.

    Track when, who, and why records are added.  Periodic clean up of records that are no longer needed.


    Once a selector is verified it remains verified until removed!

    DMARC - seals the deal, trust, & reporting

    If you are not using DMARC, start with core policy of monitor only (p=none) then move through quarantine to reject once your legitimate mail sources are confirmed.  Configure DMARC after SPF & DKIM are correct.

    Image of DMARC report showing number of success and failed emails.
    Securing without monitoring is sleeping with ear plugs because the security dog is barking. 


    If your documentation, configuration, & monitoring is more like...

    rock

    paper

    scissors

    Did you get the email

    let's schedule a time to talk.   843-766-9268

    Little white figure pressing blue help button

    Remote Support

    There's a reason you choose the Lowcountry.  


    You know our techs, we see each other at your office, the grocery store, church, festivals, and the coffee shop.



    Make sure you know any person that you allow to remotely access your computer.

    We will not ask for any code or verification from you, we will provide you with the directions and the code.

    If there is any concerns, call us back on the phone number you already have. 

    If there is any question ask our tech to come on site, we will be there as quickly as possible.


    If you expect abuse of our remote support platform, please contact us and let the support tool know at https://join.zoho.com/report-abuse

    π
    π