Status Page
Investigating - We are investigating reports of some users receiving bounce back notices indicating Microsoft 365 sending IP listed on a third party blocklist.

We will post a health service alert once we have received confirmation from Microsoft. We will provide updates as we receive them.

Feb 27, 2024 - 10:48 CST
Monitoring - We have implemented a hot fix and our monitoring has confirmed the issue has stabilized and log ins are processing as expected now. We are actively monitoring for any further issues. We apologize for any inconvenience this may have caused.
Feb 26, 2024 - 12:50 CST
Identified - We have identified an issue in which our Customer Portal is intermittently having log in failures. We have identified the root cause and are working on resolving this. In the interim, we have monitors in place and are taking proactive measures to alleviate the log in issues as they appear. We apologize for any inconvenience this may currently be causing.
Feb 26, 2024 - 08:14 CST
Update - We are continuing to investigate this issue.
Feb 26, 2024 - 11:28 CST
Investigating - We are actively working with Instagram to correct the issue. Once fixed, the Instagram Capture application will automatically capture historical activity since the last successful capture. Installation notifications have been turned off as we work to resolve this and will resume once issue has been fixed.
Feb 23, 2024 - 14:22 CST
Identified -

Message Summary:

Publicly switched telephone networks (PSTN) such as SMS and voice authentication are the weakest forms of MFA. To help your users move away from them, Microsoft is introducing changes to the Microsoft managed state of the Registration campaign feature in Azure Active Directory.

When this will happen:

Starting July 10, 2023

How this affects your organization:

Starting July 10th, 2023, users in your organization that are relying on SMS and voice for MFA will be prompted to register with the Microsoft Authenticator app. They can skip this prompt for a maximum of 3 times, after which registration of the app will be required.

What you can do to prepare:

We urge you to motivate your users to stop using SMS and voice for MFA. However, if some of your users need more time you can exempt them for now. Sign in as Global Administrator or Authentication Policy Administrator and go to Azure AD > Protect & Secure > Authentication Methods > Registration campaign and exclude these users.

Please see the following KB articles for further information and steps for managing the new MFA changes:

MFA Policy Changes and Registration Campaign -

How to Manage MFA Registration Campaign as Admin -

How to Register with Microsoft Authenticator App as User -

Jun 26, 2023 - 10:41 CDT
Identified - In an effort to help provide the best security for our customers and their data, on Oct 2, 2023, all callers that contact Support will be required to be authenticated before the call will proceed.

Please understand this new process has not been put in place to create any inconvenience, it is to create a better layer of security of your account and data.

Sep 13, 2023 - 12:42 CDT
Identified -

Due to recent changes in the Exchange security postures with the latest security updates applied to Hosted Exchange:

Starting the 14th of January 2024, the ability to send email from an alias POP account of a mailbox, will no longer continue to work. If you attempt to send from an alias POP account address after the 14th, you will receive a bounce message, or a pop-up message depending on your mail client, informing you that you do not have permission to complete the action.  If you still need the ability to send email from an alias, you can use the following Knowledge Based article to use Exchange groups as the new method for sending:


Dec 06, 2023 - 14:31 CST
Update - .
Sep 11, 2023 - 17:17 CDT
Identified - What changes are occurring?
Late last year we started alerting all Hosted Exchange customers of the upcoming deprecation of TLS 1.0 and 1.1. Hosted Exchange will be disabling TLS 1.0 and TLS 1.1 and moving all of our online services to TLS 1.2 as of September 11, 2023.

How does this affect me?
As of September 11, 2023, Hosted Exchange will no longer support TLS 1.0 and 1.1. By September 11, 2023, all client and browser combinations should use TLS version 1.2 (or a later version) to ensure connection without issues to our services. This may require updates to certain clients and browser combinations. If you do not update to TLS version 1.2 (or later) by September 11, 2023, you may experience issues when connecting to Hosted Exchange. If you experience an issue related to the use of an old TLS version after September 11, 2023, you will be required to update to TLS 1.2 as part of the resolution.

What do I need to do to prepare for this change?
We recommend you proactively address weak TLS usage by removing TLS 1.0/1.1 dependencies in your environments and disabling TLS 1.0/1.1 at the operating system level where possible. Clients using Outlook 2010 for Windows or Outlook 2011 for Mac will need to change to be replaced with newer versions. Clients using Outlook 2013 SP1 (or higher), Outlook 2016 for Mac will need to ensure that they are up to date. Windows 7 users can use TLS 1.2 client applications and browsers if changes are made using the following Microsoft guidance at Update to enable TLS 1.1 and TLS 1.2 as default secure protocols in WinHTTP in Windows (

Jun 26, 2023 - 14:16 CDT
Archive Services ? Degraded Performance
Information Archive / ZCP Degraded Performance
Erado Archiving ? Degraded Performance
Legacy Archive / ZixArchive Degraded Performance
CloudAlly Backup Operational
Encryption Services Operational
EMP/DeliverySlip Operational
Erado SecureMail (ESM) Operational
Hosted ZixGateway Operational
Hosted SMB Operational
Secure Cloud Email Encryption (AEE/ZEE) Operational
ZixPortal Operational
Customer Portal Interface Operational
Customer Portal Operational
Partner Portal Operational
Billing Area Operational
ZixCentral ? Operational
Secure Hosted Exchange Operational
Exchange 2013/2016+ (EXG7) Operational
Office 365 Degraded Performance
DNS Hosting ? Operational
Support Infrastructure Operational
Phone System Operational
Live Chat Operational
Support Ticketing System Operational
Threat Protection Operational
Email Threat Protection ? Operational
Zix Protect/Spam Stops Here ? Operational
Email Continuity Operational
Secure Cloud Email Continuity Operational
Legacy Continuty Operational
Datacenter Operational
90 days ago
100.0 % uptime
Degraded Performance
Partial Outage
Major Outage
Major outage
Partial outage
No downtime recorded on this day.
No data exists for this day.
had a major outage.
had a partial outage.
Past Incidents
Mar 4, 2024

No incidents reported today.

Mar 3, 2024

No incidents reported.

Mar 2, 2024

No incidents reported.

Mar 1, 2024

No incidents reported.

Feb 29, 2024

No incidents reported.

Feb 28, 2024

No incidents reported.

Feb 27, 2024

Unresolved incident: M365 users may be receive a Non-Delivery Report (NDR) when sending.

Feb 26, 2024

Unresolved incidents: Customer Portal intermitent log in issues, Instagram capture and installation currently unavailable..

Feb 25, 2024
Completed - The scheduled maintenance has been completed.
Feb 25, 04:00 CST
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Feb 25, 02:00 CST
Scheduled - Sunday morning our engineers will be upgrading DUO on our ZixCentral Hosted Service Platform. During this time they will also be applying security updates which will cause a brief downtime of Administrator access to the interface.
Feb 21, 10:40 CST
Feb 24, 2024

No incidents reported.

Feb 23, 2024
Completed - The scheduled maintenance has been completed.
Feb 23, 00:00 CST
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Feb 22, 22:00 CST
Scheduled - We will be undergoing Customer Portal maintenance between 10:00PM-12:00AM Central time.

The Customer Portal may have periods of inaccessibility or degraded functionality during this window of time.

If you require immediate assistance, please contact our Support teams via phone at 888-576-4949 or via email to

Feb 22, 06:39 CST
Feb 22, 2024
Resolved - We have confirmed the issue has been resolved. This appeared to be part of the larger AT&T outage experienced by their network.
Feb 22, 19:15 CST
Investigating - Our 2 Factor Authentication provider for our Customer Portal is currently experiencing issues with short codes to US based AT&T users and working on resolving this. If needed, you can configure an authenticatior app as a workaround and we will provide updates as we get them from our service provider.
Feb 22, 07:41 CST
Feb 21, 2024

No incidents reported.

Feb 20, 2024

No incidents reported.

Feb 19, 2024

No incidents reported.