SPF: A Guide to Email Authentication

Understanding SPF: A Guide to Email Authentication

SPF (Sender Policy Framework) is an email authentication protocol that allows domain owners to define which mail servers are allowed to send email from their domain. This helps to protect against email-spoofing, phishing, and other types of email-based abuse. SPF is one of the most widely used email authentication protocols.

What is SPF?

As email continues to be one of the most commonly used pathways of communication for businesses, it’s important to understand the components of an effective email. One of the fundamental components of a trustworthy and secure email is the use of Sender Policy Framework (SPF) authentication.

SPF is a simple email validation system allowing domain users to specify which servers are granted access to send email via the domain. This SPF validation prevents spammers from sending emails which appear to come from your domain. The prevention of invalidated emails from being sent keeps your email domain safe from being marked as a spam domain. 

The standard SPF record recommended by Google is:

v=spf1 include:_spf.google.com ~all

This SPF record is broken down as follows:


This indicates the version of SPF to use. Only spf1 currently exists.


SPF record inherits all of Google’s IP addresses and passes all email sent from those IPs.


SoftFail all messages sent from other Ips.

In the event you send emails from a different server, application, scanner etc., then you also must:

Include the IP of that other sending mechanism in the SPF. That is if the Ip of the sending mechanism is, then update the SPF as follows:

v=spf1 ip4: include:_spf.google.com ~all

Make sure you are also adding the sending IP to the EMail Allowlist in the Google Admin Console.

What is Spam?

Spam is the term commonly used for mass unsolicited emails. These spam emails are typically used by businesses for commercial purposes. With the cost of emails being incredibly low, some illegitimate businesses send out spam emails either manually or using botnets.

Spam Factors

Authentication Reputation:

  • Is SPF, DKIM, or DMARC added?
  • Are all of the sending IPs on the SPF?

Domain Reputation:

User Reputation:

  • Has this user been sending mass spam messages?
  • Has this user marked messages as spam?

Environment Setup:

  • How is Authentication denied for the environment?

Message Content and Format:

  • Does the content have multiple links?
  • Is the content RFC 5322-compiant?
  • Does the content follow the recommendation of the bulk sender guidelines?


How Users Control Spam 

False Negative 

False negative messages are incorrectly classified as “Not Spam”.

In cases of false negatives, the users can click on “report spam” so that their inbox can recognize messages such as this should be considered spam in the future.

False Positive

False positive messages are incorrectly classified as “Spam”.

In cases of false positive messages, users can mark the message as “Not spam” so their inbox can recognize messages such as this are not spam in the future.

Sending Messages

When users are sending legitimate emails, especially in large volume such as marketing emails, it is recommended to follow common anti-spam recommendations such as in RFC 2505.


How Admins Control Spam

Google allowlist

Google Workspace gives Gmail Administrators several ways to manage incoming email received by their organization. Gmail Administrators can block specific senders using a denylist as well as bypass spam filters with an allowlist or a specific approved senders list.

Inbound Gateway

An inbound gateway is designed to skip all the IPs added to the setting and running the authentication checks on the first detected public IP (this should be the real sending IP). This gives accurate authentication results and will eliminate the possibility of google suspecting an email attack.

Inbound Gateway influences the behavior of reputation checks and SPF checks.

The Bottom Line

Email is a simple and commonly used communication method on the surface, however as you can see there are many factors in creating an effective email. Hopefully this article has assisted you with your understanding of SPF and how it applies to email.

Not sure if you’re ready to revolutionize the way your business communicates? Sign up for our 14-day free trial!

What do you have to lose?

Cody Kelly

Cody Kelly

Cody is an experienced Marketing Specialist with over a decade worth of experience in marketing and client success. He creates and optimizes content, articles and guides to help businesses of all sizes grow. With a background in marketing, hospitality, and finance, Cody has consistently increased profitability for clients with strategic planning while delivering first class service.

Related Articles

How to Text from a Computer

How to Text from a Computer

From utilizing online texting platforms like CloudContactAI to harnessing the power of browser extensions, integrated communication suites, and voice-to-text transcription services, we’ll cover a wide range of methods to suit your preferences and needs. Whether you’re an Apple user looking to send messages seamlessly with Messages on Mac or an Android enthusiast exploring Messages by Google, there’s a solution available to suit every device and communication style.

How to Block Text Messages on iOS and Android

How to Block Text Messages on iOS and Android

Discover how to take control of your text inbox and block unwanted messages on both iOS and Android devices. With the proliferation of spam and scams, it’s more important than ever to safeguard your messaging experience. Learn step-by-step methods to block texts as an individual and as a business, ensuring that only trusted contacts can reach you. Say goodbye to annoying messages and reclaim your peace of mind today.

Smartphone History: A Timeline

Smartphone History: A Timeline

Delve into the origins of the first smartphone and discover the pivotal moments that shaped the evolution of this revolutionary device. From the groundbreaking IBM Simon to the game-changing debut of the iPhone, witness how smartphones have redefined the way we communicate, work, and play. With a rich blend of historical insights and forward-looking speculation, this comprehensive exploration promises to captivate and inspire anyone with a curiosity for the transformative power of innovation.