Configure SPF, DKIM, and DMARC for every sending domain: SPF authorizes your sending sources (include Google / Microsoft / custom SMTP as appropriate), DKIM signs outbound messages (rotate keys periodically), and DMARC aligns the two with an enforcement policy (start at p=none, graduate to p=quarantine).
DNS Setup Guide
How to configure SPF, DKIM, DMARC and MX records for your sending domains.
Quick Answer
Every sending domain needs four DNS records to pass authentication and stay deliverable: SPF (authorizes which servers can send), DKIM (signs emails cryptographically), DMARC (tells receivers what to do with unauthenticated mail), and MX (lets your domain receive replies, bounces and unsubscribes). Superkabe checks all four during infrastructure assessment and flags any that are missing or misconfigured. The DNS Authentication card on each domain's detail page also includes a Check now button that runs the same checks on demand.
Use our free tools: SPF Lookup | DKIM Lookup | DMARC Lookup
Where do these records live?
All four records are configured at your DNS provider (the place you registered or manage your domain — GoDaddy, Cloudflare, Namecheap, Route 53, etc.) — not at Superkabe and not at any sequencing/sending tool.
What goes inside each record depends on which mailbox provider you use to actually send the email (Google Workspace, Microsoft 365, or a custom SMTP provider). The examples below cover the common providers; pick the one that matches your setup.
1. SPF (Sender Policy Framework)
SPF tells receiving mail servers which IP addresses and services are authorized to send email on behalf of your domain. Missing or misconfigured SPF is one of the most common reasons cold email lands in spam.
Where to add it
- Open your DNS provider's admin panel for the sending domain (the domain in your
From:address). - Add a TXT record for the root domain (host
@or your bare domain — e.g.yourdomain.com). There must be exactly one SPF record per domain. - Set the value to whichever record matches your sending infrastructure (see below). End with
~allwhile warming up and only move to-allonce your authentication is fully stable across all sources. - Save the record and verify with the SPF Lookup tool or the Check now button on the domain detail page.
Google Workspace
Use this when your sending mailboxes are Google Workspace accounts (the most common Superkabe setup).
Microsoft 365 / Outlook
Use this when your sending mailboxes are Microsoft 365 / Outlook accounts.
Custom SMTP / dedicated IPs
Use this when you connect mailboxes via raw SMTP credentials and own the sending IP (or a small pool of IPs).
Multiple sources
Combine includes when more than one infrastructure sends from this domain. Stay under 10 DNS lookups total (each include: counts as one).
Common Mistakes
- Multiple SPF records — only one TXT record starting with
v=spf1is allowed per domain. If you need multiple senders, merge them into a single record using extrainclude:mechanisms. - Too many DNS lookups — SPF allows a maximum of 10 DNS lookups during evaluation. Each
include:counts. Useip4:for static IPs to save lookups. - Using
-alltoo early — a hard-fail can cause legitimate emails to be rejected during warmup or while a new sender is added. Stick with~alluntil your authentication is stable across every source.
2. DKIM (DomainKeys Identified Mail)
DKIM adds a cryptographic signature to every outgoing email, proving the message was authorised by your domain and hasn't been modified in transit. Receivers use this signature to verify legitimacy.
How to set it up
- Generate the DKIM key pair at your mailbox provider:
- Google Workspace: Admin Console → Apps → Google Workspace → Gmail → Authenticate Email. Select the domain and click Generate new record.
- Microsoft 365: Defender Portal → Email & collaboration → Policies → DKIM. Enable DKIM signing for your domain and copy the two CNAME records that appear.
- Custom SMTP / dedicated infrastructure: generate a 2048-bit RSA key pair (
openssl genrsa) and publish the public key as a TXT record at the selector subdomain.
- Add the TXT (or CNAME) record at your DNS provider with the selector as a subdomain — e.g.
google._domainkey.yourdomain.comfor Google,selector1._domainkey.yourdomain.comfor Microsoft 365. - Wait 10–30 minutes for DNS to propagate, then go back to your mailbox provider and click the Activate / Start authentication button.
- Verify using the DKIM Lookup tool with your selector. Superkabe's assessment also probes the common selectors (
default,google,selector1,selector2) during the periodic sweep.
Common Mistakes
- Wrong selector name — the selector you publish must match exactly what the mailbox provider uses to sign outgoing mail. Copy the exact name from the provider's setup screen.
- Forgot to activate — Google Workspace and Microsoft 365 both require an explicit Activate click after the DNS record is published. Until then, signed mail will fail DKIM.
- Single record split across lines — some DNS providers wrap long TXT values. Make sure the value renders as one contiguous string after publication.
3. DMARC (Domain-based Message Authentication)
DMARC ties SPF and DKIM together and tells receiving servers what to do when authentication fails. It also enables aggregate reporting so you can see who is sending mail as your domain.
Recommended record for cold email
Add a TXT record at _dmarc.yourdomain.com with this value:
- p=none — monitoring only. Recommended for new domains. Move to
p=quarantineafter 30 days of clean reports and top=rejectonce you're fully confident in your authentication. - rua= — email address to receive aggregate reports. Use a dedicated address or sign up for a DMARC reporting service like Postmark, dmarcian, or Easydmarc.
- pct=100 — apply the policy to 100% of messages.
Superkabe scores DMARC passing for p=quarantine or p=reject, and weak for p=none — the latter is monitoring only and doesn't actually protect against spoofing. A missing DMARC record scores as failing.
4. MX (Mail Exchange)
MX records tell the rest of the internet where to deliver mail addressed to your domain. For sending domains, MX is what allows replies, bounce notifications and unsubscribe responses to reach you. A domain with no MX records can send mail but cannot receive any — which means you lose visibility into bounces and replies entirely.
How to set it up
- Find your mailbox provider's MX records. Each provider publishes them publicly:
- Google Workspace: a single record
smtp.google.comat priority1(modern setup), or the legacy 5-record setaspmx.l.google.com+ four ALT records. - Microsoft 365:
<tenant>-com.mail.protection.outlook.comat priority0. Find the exact value in Microsoft 365 Admin → Domains. - Custom mail host: use whatever MX value your host provides (e.g.
mx1.your-host.comat priority10).
- Google Workspace: a single record
- Add the MX record(s) at your DNS provider for the root domain. Each record needs a priority (lower = preferred) and an exchange hostname.
- Verify with the Check now button on the domain's detail page. Superkabe will list every published MX record with its priority directly in the DNS Authentication card.
Common Mistakes
- No MX records at all — common for "sending-only" domains where the user assumed they didn't need to receive. Replies, bounces and unsubscribes will silently disappear, breaking the entire feedback loop Superkabe relies on for healing.
- Wrong priority order — receiving mail servers try the lowest priority first, then fall back. If you publish a placeholder MX at priority 1 and your real provider at priority 10, mail will be lost.
- Mixing providers — don't mix MX hosts from Google Workspace and Microsoft 365 on the same domain. Pick one and route everything to it.
What Superkabe Checks
During the periodic infrastructure assessment (and whenever you click Check now on a domain's detail page), Superkabe verifies all four records:
| Check | Pass criteria | Impact if missing |
|---|---|---|
| SPF | Valid v=spf1 TXT record with ≤10 lookups. | Emails may land in spam or be rejected outright. |
| DKIM | Valid public key at any common selector (default, google, selector1, selector2). | Emails can be spoofed; reputation damage compounds over time. |
| DMARC | Valid v=DMARC1 TXT record at _dmarc. subdomain. p=quarantine or p=reject passes; p=none warns. | No policy enforcement; phishing and spoofing protections off. |
| MX | At least one MX record published at the root domain. | Domain can't receive replies, bounces or unsubscribes — breaks the feedback loop Superkabe needs to heal mailboxes. |
Frequently Asked Questions
Why does SPF fail after I add a new sending source?
+
SPF has a 10-DNS-lookup limit. Adding a new `include:` often pushes you over. Fix by flattening includes using a subdomain delegation or SPF flattening service, not by removing legitimate senders.
What's the right DMARC policy for cold outreach?
+
Start at p=none with rua= reports pointed at a DMARC aggregator. After confirming alignment is clean for 2–4 weeks, graduate to p=quarantine. Most cold email teams do not need p=reject.