How to use cPanel Web Disk

How to use cPanel Web Disk

cPanel Webdisk

Use cPanel Web Disk as a Cloud storage facility for managing and sharing your documents and files. Create Web Disk accounts in cPanel and save connections in your devices as network drives to provide access on your local devices.

cpanel web disk landing page

 

Click on the headers below to find out how to use cPanel’s Web Disk module. Click on images to see in full resolution.

Plan a Web Disk folder structure

Web disk is a useful resource for saving files for access from computers and mobile devices that have been configured to connect to Web Disk user profile. Some organizations use the utility for off-site file backup.

Create a folder structure with user accounts

First, plan a folder structure (directory in Linux parlance) that can scale as your needs grow and change. For instance, you might create a user account for Accounting, and a user account for Marketing. This way, you can control how staff connect to the right files. Web Disk may be a useful mechanism for backing up local files, too.

Next, create a “sandbox” account to test account creation and connectivity. Then, you ca establish user accounts in cPanel and download connection scripts which can be installed on desired devices.

web disk connection screen

Your server can generate cconnection scripts that you can install on devices to create a permanent connection to files from computers and mobile devices.

Secure data transfer

Connections between your web server and connected devices leverage your web server’s SSL certificate. This means that your connected computer can connect to a Web Disk drive so that the Web Disk location appears in Windows File Explorer or Mac OS Finder. If you need to connect to multiple Web Disk accounts, download a script for each account you have privileges to connect to.

File sharing

Modern approaches to file sharing reduce the risk of duplication and version problems that have plagued workgroups in the past. Solutions like Microsoft 365 provide GDPR-compliant utilities to control versions and multi-user editing in real time. Web Disk does not include these kinds of tools.

There are third party add-on solutions that expand file sharing options for Web Disk to emulate Microsoft 365’s capabilities. Be aware that Web Disk may not be a suitable for you if your organization relies on version control and simultaneous multi user editing. 

Create a new Web Disk account

Only the web site owner can create Web Disk Accounts. Log into cPanel using the data sheet we have provided you with and navigate to Files > Web Disk. Click open the utility.

web disk utility

Leave your primary user account alone

When you open Web Disk, you will see that a user account is already established. Leave this primary account alone. Your primary Web Disk account has access to all directories on your web server, including your web site pages and database. Sharing credentials for the primary accounts which poses a catastrophic risks if shared.

Instead, adding accounts makes it is easier to manage and revoke access for individual users without affecting the primary account. Also, creating a hierarcy of accounts helps you track/change/remove users and privileges.

 Add an account

  1. Scroll down the Web Disk page and click open Create an Additional Web Disk Account
  2. Fill in the fields, including user name and permissions
  3. Use the recomended directory location
  4. Enable <Digest Authentication> (for Windows users)
  5. Review the account privileges and click <Create>

web disk additional account

Edit new and existing accounts under the <Manage Additional Web Disk Accounts> heading

Download and install connection script

Once your account is created you can edit properties, change passwords, and download connection scripts for that account. Distribute connection scripts to users or devices that need connecting to the account.

To install the installation script, click on the downloaded file and follow the prompts. When you enter your login credentials you will need to enter the full syntax for the account (e.g. marketing@my-server-name, not “marketing”). This will connect you to your web disk account on your web server. In future, you will find a link to your Web Disk account in File Manager or Finder.

web disk connection screen

Your server can generate connection scripts that you can install on devices to create a permanent connection to files from computers and mobile devices.

If you are connecting to multiple folders, download a script for each account. Also, if you are the web site owner, you have automatic privileges to all directories on your server.

Create file links for email

Today, organizations send file attachments using links. Email file attachment links:

  • reduces email storage costs
  • reduces bandwidth usage
  • helps control file version problems
  • reduces the risk of emails being rejected by recipients who restrict file attachment sizes.

As email users and storage increase over time, organizations of all sizes have to deal with bloat. So it is important to establish a policy to address this looming problem. There are options to do this with Webdisk and add-on software.

    Enable file sharing permissions individually

    To grant an email recipient access to a linked file, access Webdisk using cPanel File manager, right clicking on a file and changing permissions to 644 and finally right clicking on the file to get a direct link to paste into your email. This is less tricky than it sounds. However, making files publicly accessible over time poses problems over time and may not be suitable for GDPR compliance.

    Enable file-sharing permissions at directory level

    Files for email attachment can also be stored in a public directory which can be created with 755 permissions. This kind of directory could be called “email attachments” or “shared with everyone. Since sharing permissions are already established, it only remains for a user to get the file link to include in an email. Also, directory contents can be reviewed over time to deal with compliance issues. 

    Third party add-ons and Webdisk customization

    You can use third party apps like Cyberduck to extend Webdisk’s finctionality to include more streamlined file links and more. Also, link expiration policies can be set at server level to control data loss or leakage. Please contact us for help with Webdisk customizations.

    Summary

    Web Disk provides a simple centralised file management system. Using Linux “user” privileges, you can create a directory hierarchy to manage user or device access to “departmental” files.

    Web Disk does not natively provide multi-user real time editing or document version options. You can use add-on software to improve functionality. You may need to develop an in-house system to notify workgroup users when a file they may want to edit is already being edited by another user. As files become more widely shared and/or users need to collaboratively edit documents, consider Microsoft 365 to address workgroup needs.

    Web disk might be a good way to back up files stored on premises. However, if Web Disk is your primary file location, be aware that backup remains your responsibility and you should implement a workflow within your GDPR documentation to manage backups.

    For expert help about Webdisk, and fully supported management please contact us.

    About ComStat.uk: Internet Service Provider Comstat provides IT support, web hosting, and media services including web design, Microsoft 365 setup, and audio/video production, serving businesses across Denbighshire, North Wales and Wirral from Ruthin, and Lancashire and the Northwest from Bolton.

     

    How to back up your web server with cPanel

    How to back up your web server with cPanel

    Backup vs Backup Wizard

    Use our cPanel utilities to backup and restore web site data content, databases, and other data on your web server.

    cPanel backup wizard

    cPanel backup utility provides workflows for backing up and restoring web site and email content

    Using cPanel’s Backup utility, you can select from data sets we have already backed up and download the files to your local drives for safekeeping.

    Using cPanel’s Backup Wizard utility, you can design your own backups. You can backup some or all or your content. Also, you can backup incremental backups which are useful when you only need to backup minor changes since your last full backup. You can store your files locally, restore them to your server, and you can use the content when migrating to a new server.

    Click on the headers below to find out how to use cPanel Backup and Backup Wizard. Click on images to view full size.

    Download Backups using cPanel Backup

    Log into your web server’s control panel – we call it cPanel. You can find how to log into your services from the web server data sheet we have provided you with.

    At your cPanel dashboard, either search for Backup or scroll to the section called Files and click on the optin called Backup.

    cPanel backup option

    About cPanel Backup

    cPanel Backup lists backups that are already made and stored on your web server. These are available in a pulldown list, including full and partial backups, that you can download. The list includes backups that we have executed as we deal with daily mantenance. You can download these backups,

    Export backup from server

    We recommend that you download backups to your local drives, and you can find help for copying backups at datacenter speeds to Google Drive, OneDrive, Dropbox, etc. Also, to conserve space and improve web page delivery speeds, note that we rotate backups so that (at time of writing) we only maintain the two latest backups.

    About Restore

    In cPanel Backup, there is an option to restore backups. If you are restoring full and partial backups, be aware that you should restore data sets in date order, starting with the earliest date stamp. 

    Create backups and restore with Backup Wizard

    Use cPanel Backup Wizard to create and download backups. Also, you can restore backups using this option.

    cPanel backup wizard

     

    Backup Wizard – more options

    Backup Wizard offers more granularity, giving you the option to select individual data sets, like your WordPress site, or your MySQL database which attaches to your WordPress site, or your email. Also, you can execute partial backups if changes that you have made to your web site are minimal.

    Using Backup Wizard you can create your own backup profile. Downloading files that we have created may limit what you are able to do.

    Summary

    cPanel’s backup utilities have proven to be reliable, however a lot of things can go wrong with backups. Your server might backup files accurately, but the data could be corrupted as it is saved because of a power brownout. Or, data might be damaged in transit as the data set is transferred elsewhere. So, although we take “snapshots” of your web site, they are not guaranteed, and we only keep updates that are current over the last 2-4 weeks.

    Therefore, you should only rely on our working backups as part of your risk management. Professionals use an array of tools to provide duplication and/or availability. In some cases, professionals mirror two or more geographically remote servers to cover a primary server failure. In some cases, this is economical and we can implement these kinds of services.

    You can protect against a single point of failure failure by developing a strategy which covers two or more methods to secure data. For instance, your web designer may keep backups. Usually these conserve work in progress so that there is a “last known working state”. You might need to maintain a longer history of backups.

    Your web designer will be glad to discuss backup strategies with you because you might mutually and economically share utilities and avoid extra cost. Also, we are always glad to help if you do not have a professional developer but need advise about strategy and products. 

    About ComStat.uk: Internet Service Provider Comstat provides IT support, web hosting, and media services including web design, Microsoft 365 setup, and audio/video production, serving businesses across Denbighshire, North Wales and Wirral from Ruthin, and Lancashire and the Northwest from Bolton.

     

    Microsoft Outlook Categories

    Microsoft Outlook's "Categories" Feature

    Use Microsoft 365 Categories to organize and manage your Outlook email, calendar, contacts, and tasks.

    microsoft 365 categories

    Tag your Outlook content with Categories to visually distinguish projects and priorities with colour-coded tags to visually differentiate content at-a-glance.

    Find things fast with Categories

    Categories help you visually target important content in your ever-growing email folders, calendars, and more. Also, you can search across Outlook for emails, events, and tasks  that are tagged with the same category. Used in a well planned scheme, you can use categories to filter an Inbox to create virtual folders on demand. This avoids duplicated content in unwieldy folder structures which leads to broken email threads and lost attachments.

    Click on the headers below to find out how to create and customize your categories. Click or tap on images to see in full screen.

    What are categories for?

    Outlook Categories help you organize and manage email, contacts, calendar events, and tasks. For instance, instead of moving or copying emails to folders, you can keep emails in your Inbox and tag emails with categories. This way, you can filter your Inbox on demand to show one or more categories.

    Categories reduce confusion

    In situations where an email is saved in two folders which  might lead to multiple email threads for the same message, it is more efficient to keep the original email in your Inbox and assign two categories to that email.

    Using tags you can:

    1. create category names and colours
    2. tag and group related emails
    3. organize your calendar events by type, such as meetings, personal appointments, or deadlines
    4. group your contacts as family, friends, colleagues, or clients
    5. organize your tasks by project, priority, or status

    virtual email folder

    Enter the name of a category you want to filter in “search” and turn your Inbox into a dynamically generated folder which lists activty associated with the tag. e.g all items tagged with “Brian” in this screenshot.

    Categories are usually used at an individual level. However A shared email account would rely on categories established for that account. Uniform categories can be established at an organizational level. This requires adminstrator-level knowledge. 

    How to create and manage tags

    Use this workflow to start creating and customizing your tags:

    1. create a new email in Outlook
    2. click open the <Categories> dropdown list.

    Outlook always lists a few categories. These are intended as a starting point. In the illustration below notice that there are user-defined categories instead of the defaults. This means Outlook’s original categories have been customized, and new categories added to the user’s library. Notice towards towards the bottom of the list the options for creating, edit, and showing categories. Click on <New category> to create a new category.

    microsoft 365 categories dropdown

    Use <all categories> to view categories. You can use the <search> field at the top of the dropdown box to pinpoint categories. Once you create a category, the same tag can be used in Email, Calendar, Contacts, and Tasks. 

    Editing and managing categories

    You can edit existing tags to change names and colours. In any email composition and calendar event windows, pull down the <categories> dropdown menu and click open <Manage categories>. Her you can “fave” categories, and you can click on the pencil icon to edit category properties. In the image below, clicking on the pencil in the DNS/web row would open the properties for that category.

    editing micorosft 365 categories

    Planning Categories

    Exit strategies matter. Plan a structure for your categories to avoid duplication and confusion. Unchecked, category libraries can become so large that users forget what categories they already have.

    For instance, if you are tagging customers, it might makes sense to have a category for “customer”, but also a drill-down or sub-heading category called “customer”-“customer surname-initials”. For example, a <heading>-<sub-heading> category might look like:

    • customer-smith-a

    This way “customer” is a global header, and the other fields are sub heading. Organising a strategy for categories helps you manage your list as it grows. This can be likened to departments, which is a common feature in charts of accounts.

    Summary

    Outlook Categories add a flexible and visual way to keep your Outlook items organized, making it easier to manage and search your communications and schedules as your database grows.

    Categories are intended for individual use, but organizations might opt to have individual users follow a common colour-coding theme and defined list defined by a manager to adopt in their own instance of Outlook. Categories can be established at organizational level. This requires administrator level implementation.

    About ComStat.uk: Internet Service Provider Comstat provides IT support, web hosting, and media services including web design, Microsoft 365 setup, and audio/video production, serving businesses across Denbighshire, North Wales and Wirral from Ruthin, and Lancashire and the Northwest from Bolton.

     

    How to backup your Microsoft 365 Authenticator credentials

    Backup Microsoft Authenticator settings

    ***Microsoft operates Microsoft Authenticator from its Entra ID service and procudeures in this post have been superceded with effect from September 2025. Instead, click here to read the latest guidelines for Microsoft Authenticator MFA account backup.***

    *****

    Backup and restore your Microsoft 365 multi-factor authentication (MFA) credentials to restore access to 365 dashboards in the event of a lost or stolen mobile phone.

    This option is especially useful for 365 tenancy owners/global administrators. For example, if you are a 365 tenancy owner/Global Administrator (global Admin) then you cannot turn to a higher authority to re-establish credentials if your credentials are lost.

    microsoft authenticator

    Click on the headers below to find out how to backup Microsoft Authenticator on Apple and Android mobile phones.

    Why backup has to be configured

    Microsoft Authenticator data is not included in iCloud and Android mobile phone backups because the security keys are critically sensitive. Instead, you can organize Authenticator data backups in Microsoft Authenticator app settings. Authenticator backups can then be saved to Google Drive/iCloud, however you have to be verify identity against a Microsoft account to validate your identity when restoring credentials.

    Microsoft Account vs Microsoft 365 account

    You need a Microsoft account to backup and restore Microsoft Authenticator credentials. A Microsoft account and a Microsoft 365 account are two different entities. Without a Microsoft account you cannot back up your 365 credentials.

    If you have a Microsoft account, but you have fogotten your credentials, you may need to establish a new Microsoft account. Do not lose the credentials to your Microsoft account. If you forget these credentials, you will not be able to connect Microsoft Authenticator on a new mobile phone to restore your settings. This would be catastrophic, so be sure to document your Microsoft Account credentials.

    How to backup Microsoft Authenticator

    Use the steps below to configure backup in Microsoft Authenticator settings. The process may vary from notes here because Microsoft updates its processes periodically. Also, the process might vary depending on your mobile phone hardware and operating system. Either way, prompts are not difficult to follow. These tips will steer you in the right direction:

    1. Open Microsoft Authenticator on your mobile phone
    2. Access Settings: Tap the three vertical dots at the top right corner and select <Settings>
    3. Enable <Backup>*
    4. Depending on your hardware, provide your Microsoft Account credentials if/when asked**

     * Apple users will need to be sure Authenticator is logged in to iCloud.

    ** In some cases, users may already be logged in to existing Microsoft Accounts, however the backup process will direct you to provide credentials as necessary. 

    Recovery & Summary

    To recover your credentials, install Microsoft Authenticator on your new mobile phone. Usually, the <Welcome> screen offers an option to <Begin Recovery>. This option depends on your hardware and software versions. The process is a little different for Apple and Android users, and is easily executed provided you have the credentials for iCloud/Google account, and your Microsoft Account.

    You should periodically check Authenticator backup settings to verify backups are current. Authenticator app settings will confirm when your credentials were last backed up.

    Authenticator offers options in settings to override Android or Apple screen-lock defaults. Also, some Apple and Android versions may need Authenticator enabling to run in the background. This can be checked in Authenticator settings.

     

     Summary

    Tenancy owners and global admins do not have scope to resort to a higher authority to restore access to a 365 dashboard if their mobile phone is lost or destroyed. Therefore it is crucial to your organization’s IT continuity to protect your access settings to 365 Admin. Microsoft Authenticator enables you to restore existing credentials which cannot otherwise be found in Android and Apple backups.

    For help, contact us using WhatsApp via our web site, or by phone.

    About ComStat.uk: Internet Service Provider Comstat provides IT support, web hosting, and media services including web design, Microsoft 365 setup, and audio/video production, serving businesses across Denbighshire, North Wales and Wirral from Ruthin, and Lancashire and the Northwest from Bolton.

     

    Configure DMARC using cPanel

    Configure DMARC using cPanel

    Authenticate outgoing email with DMARC

    Configure DMARC (Domain-based Message Authentication, Reporting, and Conformance) to help protect your domain name from being used for email spoofing. Unless you configure DMARC, email that you send can be dropped by a receiver’s email server before reaching that user’s Inbox.

    dmarc txt record using cpanel

    Click on the headers below to follow our guide to obtain a DMARC record using cPanel WHM and then configure your DMARC record in your domain name’s zone record at your domain registrar. Click on images to see in full resolution.

    How to prepare

    DMARC is already enabled on your web server. DMARC builds on DKIM and SPF, so before implementing DMARC, be sure to implement DKIM first.

    Before you configure DMARC in your domain name’s zone record, you will need to understand where your domain name is managed. If your domain name is held at a domain name supplier using their nameservers, you will need to configure DMARC records in your domain name’s zone record at your supplier. If you own the domain, but we hold it in our management portfolio, then you might only need to make amendments in cPanel which will make things easier.

    Therefore, before you start, prepare as follows:

    1. if in doubt, check with us where your records need modifying
    2. find your cPanel login credentials from your server information sheet
    3. (optionally) find the login credentials for your domain name supplier

    We recommend you add a DMARC record to your domain name’s zone record which initially operates DMARC in test mode. Our workflow therefore is designed to accomplish this preliminary objective.

    Making adjustments to your domain name’s zone record requires exacting language and sytax. A missing character can cause a web site to cease functioning and disable your email. Nor can you test it – changes made have effect in real time. Be sure to copy records before overwriting “last known working” states.

    We have decades of experience managing domain names on behalf of clients. If you are nervous about dealing with this technology, we can provide admin support for domain names and ongoing services – ask for help.

    Step-by-step instructions

    Follow these instructions caefully to configure DMARC and activate the service. Each step is important. Missing characters like colons, semi-colons, and spelling mistakes can cause a lot of work.

    1. Log in to cPanel:

    • open your web browser
    • enter your cPanel URL (e.g., https://yourdomain.com:2083)
    • log in with your cPanel credentials

    2. Navigate to <Zone Editor>

    • in cPanel dashboard, scroll to <Domains> section
    • find and click open <Zone Editor>

    3. Look for a DMARC Record:

    • in Zone Editor, find the domain you want to check
    • click <Manage> next to the domain
    • look for a TXT record with the name: _dmarc.yourdomain.com
    • if you do not see one, you will need to create it

    4. Create or Modify a DMARC Record:

    • if you need to create a new DMARC record, click <Add Record>
    • choose <TXT Record> from the <+Add> dropdown list
    • in the <Name> field, enter: _dmarc
    • in the <TTL> field, leave the default value
    • in the <Type> field, select: TXT
    • in the <Record field>, enter your DMARC policy. For now, use:
      • v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; ruf=mailto:dmarc-failures@yourdomain.com; sp=none; pct=100
    • for <mailto:> substitute your preferred email address• see notes below
    • select and copy the record field to clipboard or notepad. You will need this later

    5. Save the DMARC Record:

    • Click <Save Record> to apply the changes

    6. Log in to Your Domain Registrar:

    • in a new browser window, go to your domain registrar’s website
    • log in with your credentials

    7. Access DNS Management:

    • find the DNS management or zone file settings
    • this section allows you to add or edit DNS records

    8. Add the DMARC Record you created in steps 4 and 5 above:

    • Add a new TXT record
    • in the <Name> field, enter: _dmarc
    • in the <Value> field, paste the DMARC policy you created and copied earlier in cPanel
    • Save the changes

    9. Verify the new DMARC record:

    • Use online tools like MXToolbox to verify your DMARC record
    • Check for typos like missing colons or spaces, or inaccurate spelling

    Notes:

    DMARC is a technology that operates on a few levels. The record we gave an example for you to use above is for a DMARC policy that shows DMARC is enabled, but not reactive (p=0). The record can be modified to p=quarantine and p=reject which cause emails that fail a test to be either quarantined or rejected by a receiver. In some circumstances like emails sent to a mailing list, values for sp and pct can also affect how your outgoing email is received.

    By using policy p=0 and establishing the email address of the person you want to receive DMARC reports, you have a minium valid record. Once this tests positive, consider upgrading the policy to p=quarantine.

    Summary

    DMARC builds upon existing protocols like SPF and DKIM to help domain name owners specify how their organisation’s emails should be treate by receiving email servers that fail authentication checks. This is important because it helps to prevent a malicious party from attempting to use your email addresses to purport to be you using spoofing and phishing attacks. Consequently, you can configure DMARC a few ways.

    Making adjustments to your domain name’s zone record requires exacting language and syntax. A missing character can cause a web site to cease functioning and disable your organisation’s email. Nor can you test a modification first – changes made have effect in real time.

    Expert help available

    We have decades of experience managing domain names on behalf of clients. If you are nervous about dealing with this technology, we can provide admin support for domain names and ongoing services. We can turn modifications in minimal time at reasonable cost while saving you from risk of web site and email disruption – please ask for help if in doubt.

    Configure DKIM in cPanel

    Verify outgoing email with DKIM

    Use DKIM (DomainKeys Identified Mail) to reduce the chance of your users’ outgoing emails ending up in customer/supplier Spam or Junk folders.

    DKIM configuration tool

    Click on the headers below to follow our guide to configure DKIM using cPanel WHM and post your DKIM records in your domain name’s zone record at your domain registrar. Click on images to see in full resolution.

    How to prepare

    DKIM is already enabled on your web server. However, the service needs to be implemented. This is because the verification process requires checking a unique DKIM record which only you can add to your domain name’s “phone book” – we call the phone book a zone record. If we have ongoing access to your domain name, we would take care of this as part of the support we provide.

    Before starting, you will need to understand where your domain name is managed. If your domain name is held at a domain name supplier using their nameservers, you will need to create DKIM records in the zone record at your supplier. If you own the domain, but we hold it in our management portfolio, then you might only need to make amendments in cPanel which will make things easier.

    Therefore, before you proceed, prepare as follows:

    1. if in doubt, check with us where your records need modifying
    2. find your cPanel login credentials from our server information sheet
    3. (optionally) find the login credentials for your domain name supplier

    We are able to manage domain names on behalf of clients. Domain name management is a critical function and unwitting errors can cause email and web site failure. If you are nervous about dealing with this technology, we can provide admin support – ask for help. For instance, if you do not have in-house expertise, we can take administrative custody of your domain to manage these kinds of jobs.

    Step-by-Step instructions

    1. Log in to WHM:

    2. Access the DKIM Settings:

    • In the WHM dashboard, search for <Email>.
    • Click on <Email Deliverability>.

    dkim configuration module

    3. Select the Domain:

    • Choose the domain you want to configure DKIM for.
    • Click <Manage> next to the domain.

    4. Enable DKIM:

    • In the DKIM section, click <Install the Suggested Record>.
    • WHM will automatically generate the DKIM record.

    5. Copy the DKIM Record:

    • After generating the DKIM record, you will see a TXT record.
    • Copy the entire TXT record, including the v=DKIM1; part.

    6. Log in to Your Domain Registrar:

    • Open your domain registrar’s website.
    • Log in with your credentials.

    7. Access DNS Management:

    • Find the DNS management or zone file settings.
    • This section allows you to add or edit DNS records.

    8. Add the DKIM Record:

    • Add a new TXT record.
    • In the Name field, enter the selector and domain (e.g., default._domainkey.yourdomain.com).
    • In the Value field, paste the DKIM record you copied from WHM.
    • Save the changes.

    9. Verify the DKIM Record:

    • Go back to WHM.
    • In the <Email Deliverability> section, click <Manage> next to your domain.
    • Click <Check> to verify the DKIM record.

    10. Test Your DKIM Setup:

    • Send a test email to ensure DKIM is working.
    • Use online tools like DKIMValidator to check if your email passes DKIM checks.

    Tips for Non-IT Users

    • Take Your Time: Follow each step carefully.
    • Ask for Help: If you get stuck, don’t hesitate to ask your registrar’s support team.
    • Double-Check Entries: Ensure there are no typos in the DKIM record.
    Summary

    Business users do not have a lot of patience when it comes to email, and not a lot of people check Spam or Junk occasionally if at all. Email that is lost in this way costs business so DKIM, along with SPF (automatically configured for you already, DMARC, and Reverse DNS are necessary utilities for providing resilient email delivery.

    Making adjustments to your domain name’s zone record requires exacting language and syntax. A missing character can cause a web site to cease functioning and disable your organisation’s email. Nor can you test a modification first – changes made have effect in real time.

    Expert help available

    We have decades of experience managing domain names on behalf of clients. If you are nervous about dealing with this technology, we can provide admin support for domain names and ongoing services – we can turn modifications in minimal time at reasonable cost and while saving you from risk of web site and email disruption – please ask for help if in doubt.

    Configure Reverse DNS (RDNS)

    Reverse DNS

    Reverse DNS, also called rDNS, is used by email servers to verify your email has reached it from an email server and IP address that you own. rDNS is crucial for email deliverability and server reputation. For instance, web site contact forms often fail because Reverse DNS is not configured properly and emails are dropped before reaching a web site owner’s Inbox. This is why SPF, rDNS, DKIM, and DMARC are so important in business email.

    Reverse DNS

    Your web server’s zone record is already configured to a rDNS mapping so you should not need to intervene unless you are operating exceptional circumstances.

    Click on the headers below to follow our guide to record a Reverse DNS/PTR record in your domain name’s zone record at your domain registrar. Click on images to see in full resolution.

    How to check rDNS is configured

    At the moment, your web server already resolves rDNS, and the record posted in cPanel > Email > Email deliverability should already resolve to:

    • Name: 10.183.202.88.in-addr.arpa.
    • Value metal1.namesfirst.net.

    Note that the IP address is recorded in the <Name> field. This is usually illegal logic, and that is why this record has to be specially handled by the owner of the IP address block your server relies on: it requires a “reverse” entry which means it has to be handled at “datacenter” level.

    rDNS is a not always an easy DNS feature to deal with. Please contact us for advice if you are in doubt about your server configuration.

    Summary

    Reverse DNS is an important tool that remail servers rely on to verify that email you send is recognized as valid. Without this validation, you may send email that is rejected or dropped before it reaches a recipient’s Inbox.

    Making adjustments to your domain name’s zone record requires exacting language and syntax. A missing character can cause a web site to cease functioning and disable your organisation’s email. Nor can you test a modification first – changes made have effect in real time.

    Expert help available

    We have decades of experience managing domain names on behalf of clients. If you are nervous about dealing with this technology, we can provide admin support for domain names and ongoing services. We can turn modifications in minimal time at reasonable cost while saving you from risk of web site and email disruption – please ask for help if in doubt. 

    Why Authoritative Nameservers Matter for Your Web Hosting Setup

    Why Authoritative Nameservers Matter for Your Web Hosting Setup

    Introduction

    Use this article to understand how a domain name relies on authoritative namservers to connect web site viewers and email users to your web server. This article is intended for Comstat.uk clients who have bought domain names elsewhere who intend to maintain the domain names in their own portfolios. This requires more client input and can delay restoration of services in the event of outages.

    If you maintain your domain names within ComStat.uk’s management portfolios we can provide streamlined support because we can access your domain names’ zone records 24/7 without recourse to clients. This means we can fix authoritative nameservers without reverting to you.

    For instance, in the event of an outage while you are away on holiday, or you cannot access your domain name control panel because you have no phone signal to handle 2FA, your web site service could be disrupted until someone can get to your domain name control panel to resolve problems. So, it is important to understand how your authoritative nameservers operate and who is repsonsible for the dashboard that manages them.

    Click on the headers below to find out about how to decide where to locate your authoritative nameservers. Click on images to view at full-sized resolution.

    What are Authoritative Nameservers?

    Authoritative nameservers hold the definitive records for a domain name that operate your email, website availability, and other services. Conventionally, two or more authoritative nameserves are in operation in case one server fails. Authoritative nameservers answer queries about domain names with the most accurate and up-to-date information about your web site, email server, and more.

    For instance, if you want to send an email, your computer has to find your authoritative nameserver to find out how to send your outgoing email. Also, it has to find where to send the email. Lastly, the receipient’s email server has to verify that email is legitimate, so it is critically important that your authoritative nameservers are operational and capable of demonstrating a good “score”. If your authoritative nameservers are not recognised and do not achieve adequate safety metrics, your emails will be dropped or sent to spam.

    Authoritative nameservers work behind the scenes to translates domain names (like comstat.uk) into IP addresses (like 192.0.2.1). To read this article, your computer had to find where the web server was that hosts the page you are reading. Often, a web site operates from one server, and email from another. Authoritative nameservers define where your services are established. 

    Using a domain name supplier's Authoritative Nameservers

    When you buy a domain name your domain name supplier will provide standard authotitative nameservers which point to your domain name’s “zone record” – a phone book – which describes where your web site is, and where your email server is. Also, it provides room for you to define records to help prove that your email is legitimate and many more things. It is important that it is secure, and safe from malicious hijack. 

     

    Pros:

    •  Reliability – good security, robust global availability

    Cons:

    • Limited control – limited customization options
    • Dependency – you rely on the registrar for DNS management
    • Manual entries – records have to be transcribed from your cPanel zone record (e.g. webmail.domainname.com)
    • Complexity – different suppliers adopt differing methodologies for scripting records
    • Resolution – some suppliers take up to 72 hours to resolve DNS
    Using your web server for Authoritative Nameservers

    When you use your web server as your authoritative nameservers, you modify records at your domain name supplier so that your web server become your authoritative nameservers. This is easy to do: you replace the standard nameservers in your domain name’s control panel with your web server’s nameservers which we will establish for you. For instance, we use nameservers like ns1.namesfirst.net and ns2.namesfirst.net. Once the nameservers are modified, all records dealing with your web site, email, webdisk, etc., are handled via cPanel.

     

    Pros:

    • Control – you/we can make changes instantly
    • Integration – seamless integration with your email, web site, etc.
    • Customization – you can tailor DNS to specialized needs
    • SSL – cPanel can automatically align SSL certificates with your web server

    Cons:

    • Security – teh onus is on the web server owner to protect against intrusion
    Summary - which one?

    Entry level web hosting services do not do much more than provide a web site, and email is usually bought as a separate service. As businesses outgrow entry level web hosting, the realities that larger business face become more evident.

    If you operate a web site via cPanel which includes email, and you intend to use services like Webdisk and automated SSL, it is probably less effort to use your web server as an authoritative web server.

    If you want to provide extra security against a malicious person hacking your authoritative nameserver, consider managing things at your domain name supplier. This will mean copying records from cPanel however, and may limit how your SSL certificate works. Also, our ability to restore services in the event of authoritative nameservers depend on us being able to reach you.

    In some cases, we also manage authoritative nameservers for clients at Cloudflare and Microsoft 365. Both provide Enterprise grade suecurity and resiliency. How your email and website are organised influences how we need to deal with your authoritative nameservers.

    Without a working authoritative namserver, web sites, email, and more cease to work. So, at some point businesses have to develop in-house skills or outsource help to manage this critical Internet technology.

    To discuss how best to manage your domain name and how best to establish your authoritative nameservers, contact us using the WhatsApp link or arrange a convenient time for us tr contact you via our contact page.

     

    Add SPF to your DNS zone record

    Authenticate your outgoing email with SPF

    Use SPF (Sender Policy Framework) is a utility that lists all the server IP addresses that a domain name can use to send emails from.

    cpanel SPF record

    Click on the headers below to follow our guide to manage SPF record using cPanel WHM and then post your SPF record in your domain name’s zone record at your domain registrar. Click on images to see in full resolution.

    Why is SPF important?

    Most people who rely on a contact form have experienced what happens when SPF is not working.

    For instance, your business might use Microsoft 365 (i.e. Exchange). Exchange handles all staff email and its servers use IP addresses to do so. Now, imagine that your business also has a web site with a contact form but the web site sends contact form email from a different IP address than Microsoft Exchange uses for everyday emails: the contact form uses the web server’s IP address. SPF means your business can validate the web site’s server IP address. Without properly configured SPF, the contact form would not work. You would never know you lost a sale. At best, contact form email might end up in Spam/Junk.

    How do I configure SPF?

    If your web server is configured for email, you might not need to do anything at all. If you already use another email service for regular email, you may need to amend your existing SPF record where you manage your domain name to include the IP address for your contact form. The best thing to do is to contact us first for advice.

    Step-by-step instructions

    This guide assumes that you need to create an SPF record at your domain name supplier, but you want to operate your email from our new web server.

    1. Log in to cPanel

    • using your web server configuration sheet, log into cPanel
    • navigate to <Email>
    • click on <Email deliverability>

    2. Find your SPF record

    • towards the top of your page, you will see a section for SPF, like you see in the screenshot below.
    • the SPF <value> is the entry you need to modify your existing domain name record where you manage your domain name – copy the record from cPanel.
    • go to your domain name supplier

    cpanel SPF record

    3. Create or edit your SPF record

    • log in to your domain name manager or zone editor
    • if there is no SPF record, create a new TXT or SPF record, and enter the the values from cPanel
    • if there is an SPF record, copy the existing record an paste/save it so you have a last known working state
    • if the existing SPF record handles other email alredy, you will need to determine how to add your web server’s IP address to the entry. This is because you use one SPF record to define all IP addresses that need to be covered.

    SPF can be the simplest of protocols to implement, especially if you are operating all email from your web server and your domain name uses our nameservers. However, SPF needs to be able to cope with diverse eventualities, and it may need configuring for multiple IP addresses that handle email for your business. If in doubt, contact us for advice.

    Summary

    SPF is already configured if your web server includes email services, so there is nothing to do if we manage your domain name for you and all your email will be handled from your web server.

    In most other cases, you should contact us for guidance before you make changes anywhere. If you do make changes to existing records, be sure to copy/paste/save those records so that you can resort to a last known working state if problems develop.

    DNS is not a forgiving technology, and if you are nervous about making real time changes that might disrupt your web site and/or email, please contact us at the very least for advice.

    Expert help available

    We have decades of experience managing domain names on behalf of clients. If you are nervous about dealing with this technology, we can provide admin support for domain names and ongoing services. We can turn modifications in minimal time at reasonable cost while saving you from risk of web site and email disruption – please ask for help if in doubt.