Compile your findings
Gather all checked items, error messages, and key findings into a summary.
Complete this 40+ item checklist to identify configuration gaps, security misconfigurations, and hidden threats before they trigger audit findings or user impact. Covers mail flow, Outlook connectivity, hybrid coexistence, access control, and threat indicators. Download as PDF for offline incident use. After completing: Schedule a security assessment to get remediation plan and compliance validation.
Collect this before any troubleshooting step.
Use this checklist if mail is not flowing or being received.
Use this checklist for authentication, connection, or stability problems.
Use this checklist for namespace, HCW, or migration problems.
Use this checklist for security events, policy violations, or compliance audits.
Use this checklist for slow performance, quota limits, or throttling.
Once you've completed your diagnostic, share with principal engineers for expert guidance.
Gather all checked items, error messages, and key findings into a summary.
Contact us with your tenant domain, impact scope, error codes, and timeline.
We'll provide a root-cause analysis, production-safe fix steps, and rollback plan within 2 hours.