SPF helps receiving servers verify whether an email source is allowed to send on behalf of your domain. In large organizations with multiple vendors, business units, and cloud platforms, SPF often becomes difficult to keep accurate and stable.
Sendmarc helps you inventory sending sources, keep SPF records healthy, and reduce authentication-related delivery issues across your domains.
When SPF is set up correctly, it can help you:
Reduce unauthorized use of your domain
Improve deliverability by eliminating SPF-related failures
SPF is an email authentication protocol that lets you publish a DNS TXT record listing which servers are allowed to send email for your domain.
SPF is checked against the envelope sender (Return-Path / MAIL FROM), not the visible “From” address people see in their inbox.
That is why SPF is usually used with DKIM and DMARC.
Verifies message integrity through cryptographic signatures
Checks alignment with the visible “From” domain and applies a policy
The receiving server identifies the sending IP and the envelope sender domain
The receiving server looks up the SPF TXT record for that domain
The sending IP is evaluated against the SPF mechanisms
The receiver returns an SPF result and may use it in filtering decisions
An SPF record is published in the DNS as a TXT entry and typically includes:
v=spf1 One or more mechanisms that define what’s allowed
A final all qualifier that defines the outcome
Example: v=spf1 ip4:192.168.0.1 include:mail.example.com -all
ip4:/ip6: Authorizes specific IP rangesa: Authorizes the domain’s A/AAAA recordsmx: Authorizes the IP addresses of the domain’s MX serversinclude: Authorizes a third-party sender’s SPF record+all: Pass-all: Fail~all: Softfail?all: NeutralMany companies aim for -all, but this should only be used once all legitimate senders are accounted for.
SPF looks simple until your environment scales.
Common reasons projects slow down include:
Email-based impersonation typically happens through spoofing, lookalike domains, or compromised accounts.
Sendmarc helps you address all three by giving your team shared visibility into authentication status and identity threat signals.
Maintain a clean SPF record as sending services change, so legitimate email can pass checks, and you avoid preventable SPF failures.
Sign outbound email with DKIM so receivers can verify the message is authentic and hasn’t been altered in transit.
Check whether SPF and/or DKIM align with the visible “From” domain, publish a policy for failures, and use reporting to see who’s sending on your behalf.
Identify and track lookalike domains that could be used to impersonate your brand, so your team can gain visibility and investigate earlier.
Monitor for exposed credentials and get clear breach alerts to speed up response and contain incidents.
Ready to reduce impersonation risk and improve authentication across your domains?
An SPF record is a DNS TXT record that lists which servers are allowed to send email for a domain. An SPF record helps receivers check whether the sending IP is authorized.
Yes, you still need SPF even if you use DKIM. SPF validates the sending source, while DKIM validates message authenticity. For the strongest results, use SPF and DKIM with DMARC.
No, you should only publish one SPF record per domain. Publishing multiple SPF TXT records can cause email delivery failures.
SPF can fail when your record exceeds the 10 DNS lookup limit or when a legitimate sender is missing.
~all and -all? The difference between ~all and -all is how unauthorized sources are treated. ~all is a softfail, which means an email is accepted but marked as suspicious. -all is a hard fail, which results in a rejection.
SPF alignment means the domain in the “Return-Path” (envelope sender) matches the domain in the “From” header. DMARC requires either SPF or DKIM alignment for an email to pass authentication and be delivered.