How to Fix Email Deliverability Issues - Complete Guide

Published March 21, 2026 - 16 min read

Your company sends an important email to a client. It never arrives. No bounce notification, no error message - the email simply vanishes into the recipient's spam folder or gets silently dropped by their mail server. The client waits, you wait, and a deal stalls because of a technical problem nobody on your team knows how to diagnose.

Email deliverability problems are among the most common and most misunderstood IT support issues. They affect transactional emails (invoices, password resets, order confirmations), internal communications forwarded externally, and every email your sales and support teams send. This guide covers the complete troubleshooting process, from DNS authentication records to content issues to reputation recovery.

Understanding Why Emails Go to Spam

Email providers (Gmail, Outlook, Yahoo, corporate mail servers) use multiple signals to decide whether an incoming email reaches the inbox, lands in spam, or gets rejected entirely. The three main categories are:

Most deliverability problems involve a combination of these factors. A missing DKIM record alone might not send every email to spam, but combined with a new sending IP and a link-heavy email body, the cumulative score tips the message over the spam threshold.

Step 1: Check and Fix Your SPF Record

SPF (Sender Policy Framework) tells receiving mail servers which IP addresses and services are authorized to send email on behalf of your domain. Without a valid SPF record, any server can claim to send email from your domain, and receiving servers have no way to verify legitimacy.

How to Check Your SPF Record

Look up your domain's SPF record using a DNS query tool. The record is a TXT record on your root domain. It looks like this:

v=spf1 include:_spf.google.com include:sendgrid.net -all

This example authorizes Google Workspace and SendGrid to send email for the domain, and tells receivers to reject (-all) email from any other source.

Common SPF Mistakes

After changing your SPF record, wait for DNS propagation (usually 1-4 hours, up to 48 hours for some providers) before testing. Use MXToolbox SPF Record Check or Google Admin Toolbox to validate the record syntax and lookup count.

Step 2: Set Up DKIM Signing

DKIM (DomainKeys Identified Mail) adds a cryptographic signature to every outgoing email. The receiving server checks this signature against a public key published in your DNS. If the signature is valid, it proves the email was sent by an authorized system and was not modified in transit.

How DKIM Works

  1. Your email server or provider generates a key pair - a private key (kept secret on the sending server) and a public key (published in DNS).
  2. When an email is sent, the server uses the private key to sign specific headers and the message body, creating a DKIM-Signature header.
  3. The receiving server extracts the signature, retrieves the public key from your DNS, and verifies the signature mathematically. If it matches, the email passes DKIM.

Setting Up DKIM

The process varies by email provider:

Verifying DKIM

Send a test email to a Gmail address, open it, click the three dots menu, and select "Show original." Look for the "DKIM:" line in the authentication results. It should say "PASS." If it says "FAIL" or is absent, the DKIM record is not configured correctly or has not propagated.

Step 3: Configure DMARC

DMARC (Domain-based Message Authentication, Reporting, and Conformance) ties SPF and DKIM together and tells receiving servers what to do when an email fails both checks. Without DMARC, receiving servers make their own judgment about failed emails. With DMARC, you explicitly instruct them to deliver, quarantine, or reject unauthenticated messages.

Creating a DMARC Record

DMARC is published as a TXT record at _dmarc.yourdomain.com. A starter record looks like this:

v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; pct=100

This tells receivers to take no action on failures (p=none) but send aggregate reports to your specified email address. This monitoring-only mode lets you see who is sending email as your domain - both legitimate services you forgot to authorize and potential spoofing attempts.

DMARC Enforcement Path

  1. p=none (monitoring). Start here. Run for 2-4 weeks while reviewing reports. Identify all legitimate sending sources and ensure they pass SPF and DKIM.
  2. p=quarantine (soft enforcement). Emails that fail DMARC go to the recipient's spam folder. This catches spoofing attempts without permanently losing legitimate email that you may have missed in the monitoring phase.
  3. p=reject (full enforcement). Emails that fail DMARC are rejected outright. This is the target state - it prevents anyone from successfully spoofing your domain. Only move here after confirming all legitimate sources pass authentication.
Moving directly to p=reject without a monitoring period is one of the most common DMARC mistakes. If you have a SaaS tool, CRM, or marketing platform sending email as your domain that you forgot to configure in SPF/DKIM, those emails will be silently rejected. Always start with p=none and review reports first.

Step 4: Check Blacklists

Email blacklists (also called blocklists or DNSBLs) are databases of IP addresses and domains known to send spam. Major email providers check incoming email against multiple blacklists. If your sending IP or domain appears on one, your deliverability drops significantly.

How to Check

Use MXToolbox Blacklist Check (mxtoolbox.com/blacklists.aspx) or MultiRBL (multirbl.valli.org). Enter your sending IP address or domain name. These tools check against 50-100 blacklists simultaneously and report which ones list you.

Common Reasons for Blacklisting

How to Get Delisted

Each blacklist has its own removal process. Most require you to visit their website, submit a delisting request, and provide evidence that the underlying problem has been resolved. Some blacklists automatically delist after a period of clean sending (usually 1-2 weeks). Others require manual requests. The critical step is to fix the root cause before requesting removal - if the problem recurs, you will be relisted and future removals become harder.

Step 5: Review Email Content

Even with perfect authentication and a clean reputation, email content can trigger spam filters. Modern filters use machine learning rather than simple keyword matching, but certain patterns still increase the spam score:

Step 6: Fix Reverse DNS (PTR Record)

If your company runs its own mail server (as opposed to using Google Workspace, Microsoft 365, or another hosted provider), the server's IP address needs a reverse DNS (PTR) record that resolves back to a hostname matching your sending domain. Without this, many receiving servers will reject or spam-filter your email.

Contact your hosting provider or ISP to set up the PTR record for your mail server's IP address. The PTR record should resolve to the hostname in your mail server's HELO/EHLO greeting, and that hostname should resolve forward (A record) back to the same IP address. This forward-confirmed reverse DNS (FCrDNS) is a baseline requirement for running a legitimate mail server.

Step 7: Monitor Ongoing Deliverability

Email deliverability is not a one-time fix. Authentication records can break when someone updates DNS without understanding the existing records. Sending IPs can get blacklisted due to a single compromised account. New email services added to the company stack can fail authentication if nobody adds them to SPF and DKIM.

Set Up Monitoring

The single most impactful thing you can do for email deliverability is to implement all three authentication protocols - SPF, DKIM, and DMARC - correctly. As of 2024, Google and Yahoo require DMARC for bulk senders, and Microsoft has announced similar requirements for 2025. These are no longer optional best practices - they are baseline requirements for reliable email delivery.

Quick Troubleshooting Checklist

When a specific email is not being delivered, work through this checklist in order:

  1. Check the sender's outbox and sent folder - did the email actually send, or is it stuck in the outbox?
  2. Check for bounce-back messages - the NDR (non-delivery report) often contains the specific rejection reason.
  3. Verify SPF, DKIM, and DMARC records are valid using MXToolbox or Google Admin Toolbox.
  4. Check if the sending IP or domain is blacklisted.
  5. Ask the recipient to check their spam/junk folder and add the sender to their contacts.
  6. Review the email headers (from the recipient side if possible) for authentication results - which checks passed and which failed.
  7. Check if the recipient's mail server is running - a server outage on their end looks like a deliverability problem on yours.
  8. Test with a different recipient at a different domain - if the email delivers to Gmail but not to the client's corporate server, the issue may be on the recipient's end.

Get IT Support Insights Delivered Weekly

Practical tips for IT teams - troubleshooting guides, cost-saving strategies, and tool reviews. No spam, unsubscribe anytime.

Ready to automate your IT support?

HelpBot resolves 60-70% of Tier 1 tickets automatically. 14-day free trial - no credit card required.

Start Free Trial

Let HelpBot Diagnose Email Issues Automatically

When users report email delivery problems, HelpBot checks DNS records, authentication status, blacklists, and mail server configuration in seconds - then provides the fix. No more manual DNS troubleshooting.

Start Your Free Trial

Back to Home

Still managing IT tickets manually?

See how HelpBot can cut your ticket resolution time by 70%. Free ROI calculator included.

Calculate Your ROIStart Free Trial