If you're using Google Workspace and haven’t set up your SPF record correctly, your emails are getting flagged — even if they technically “deliver.”
This guide shows you how to add the exact SPF TXT record Google requires, where to paste it in your DNS settings, and how to verify it’s working.
You’ll follow a 3-minute process — with zero guesswork — to:
You don’t need to be technical. You just need to follow this once, and do it right.
Let’s start.
An SPF record (Sender Policy Framework) is a DNS TXT record that tells the world which mail servers are allowed to send emails on behalf of your domain.
When you send an email from Google Workspace, Gmail needs to prove:
“Yes, this message actually came from my domain — and not from some spammer pretending to be me.”
That’s what the SPF record does.
For Google Workspace, your SPF record should include this exact line:
“v=spf1 include:_spf.google.com ~all”
If you skip this?
Email providers start to doubt you.
Some will deliver your emails straight to spam. Others will block them altogether.
SPF is not enough on its own.
You also need DKIM (to verify the message content) and DMARC (to enforce your rules).
But SPF is the first and most basic requirement for getting your emails past spam filters.
It’s how you protect your domain from email spoofing, improve trust with inbox providers, and give your emails a real shot at landing where they belong in the primary inbox.
Let’s get yours set up.
Using Google Workspace without SPF? Your emails might be sent, but inboxes already suspect them.
Here’s what actually happens:
If you're not authenticating your domain, you’re not doing email. You're just shouting into the void.
Here’s the exact SPF record Google recommends:
“v=spf1 include:_spf.google.com ~all”
Copy that. Paste it into your DNS settings. Done.
Now let’s break it down — fast:
~all vs -all — Which One Should You Use?
Adding Other Sending Services to SPF
If you're using another tool alongside Google (like a cold email platform or a CRM), you’ll need to merge SPF records into one line:
You can use the SPF Record Generator by Salesforge to instantly create valid SPF strings for multiple services — including Google Workspace, Mailforge, and more.
Example:
v=spf1 include:_spf.google.com include:spf.mailforge.ai ~all
✅ One SPF record only.
❌ Multiple SPF records = fail. Always combine them.
Do it right, and you’ll have clean authentication — no matter how many platforms you're sending from.
You don’t need to overthink this.
Here’s the exact 3-step process to set up your Google Workspace SPF record — fast.
This is where your SPF record goes.
Fill in the fields exactly like this:
Value:
v=spf1 include:_spf.google.com ~all
📌 This line authorizes Google servers to send email from your domain. If you’re using other tools too, you’ll need to combine includes into a single line.
Don’t want to do this again for 10 domains? Mailforge automates SPF + DKIM + DMARC in one click.
Once verified, your SPF is live.
You're now authenticated and one step closer to hitting the inbox, not the spam folder.
Here are the 3 most common SPF mistakes that destroy your deliverability (and how to fix them).
If your domain has more than one SPF TXT record, email authentication will fail, even if both records are technically correct.
💡 Fix:
Always combine all senders into a single SPF record like this:
v=spf1 include:_spf.google.com include:another-sender.com ~all
🛑 One domain = one SPF record. No exceptions.
Most SPF failures come from bad syntax. These are the killers:
💡 Fix:
Copy the full record carefully. If you’re unsure, run it through MXToolbox before saving.
You added the record, but it’s not validating yet? That’s not always an error.
SPF changes can take up to 48 hours to fully propagate across DNS servers.
💡 Fix:
Wait a few hours, then use tools like:
Don’t assume it’s broken — DNS just takes time.
If you want real inbox placement — not just deliverability — follow these best practices.
Summary Table in case you have less time:
Now let’s understand this in detail.
Every SPF record must start with v=spf1 and end with ~all (soft fail) or -all (hard fail).
Skip either, and your record becomes useless.
Google and other providers only allow 10 DNS lookups per SPF check.
Go over that, and the whole thing breaks — silently.
SPF records change as your tools change.
Add a new sender and forget to update SPF?
Boom — your emails land in spam.
💡 Run a quick check monthly on MXToolbox.
SPF alone isn’t enough anymore.
To fully authenticate your domain, you need:
Are your DKIM and DMARC active?
Salesforge has a DKIM Checker and DMARC Checker — both free, no login needed.
Together, they form your deliverability firewall.
If you notice a sudden spike in bounces or replies drop to zero, don’t blame your copy first.
Check your SPF, DKIM, and domain health.
Use Salesforge’s Domain Checker Tool to confirm DNS ownership and TTL propagation across servers, especially helpful when working with new domains.
🧠 Deliverability is not just a tech issue. It’s a visibility issue.
Follow these SPF best practices, and your emails will land exactly where they should: the inbox.
Once you’ve added your SPF record, don’t assume it’s working.
Use these tools to check, verify, and troubleshoot SPF — fast.
MXToolbox SPF Checker is the easiest way to check if your SPF record is valid.
Paste your domain name — it tells you:
If you want instant feedback on what’s wrong with your SPF setup, start here.
Already using Google Workspace?
Here’s how to verify SPF inside your admin panel:
It’ll show whether your domain is passing SPF checks or not.
No need to use external tools — it’s built in.
If you're comfortable using a terminal, you can directly query your domain’s DNS:
For Linux/Mac:
dig txt yourdomain.com
For Windows:
nslookup -type=txt yourdomain.com
This tells you exactly what SPF record is live on your domain — no UI, no delay.
Or try the free SPF Checker from Salesforge — it validates your SPF record live and flags errors like missing prefixes, unsupported syntax, or multiple records.
If you’re only managing one domain, manual setup is fine.
But if you’re running outreach across 5, 10, or 50+ domains, things break fast.
And here Mailforge can help.
It automatically sets up:
All from one dashboard.
You never have to touch DNS again — even if you’re sending cold emails from 100 domains.
🧠 Pro Tip: If you're running cold outreach or want airtight deliverability, Mailforge handles everything, at scale, in under 5 minutes.
These tools aren’t optional.
SPF without verification = guessing.
Use the right tool for your setup, and you’ll never have to wonder why your emails landed in spam.
Here’s how manual SPF setup stacks up against Mailforge:
Still confused? Let’s clear up the most common questions people ask about SPF and Google Workspace.
A: No.
One domain = one SPF TXT record.
If you're using multiple tools (like Google+ + another sender), combine them like this:
v=spf1 include:_spf.google.com include:otherservice.com ~all
A: Your emails might look legit to you, but to Gmail and other inboxes, they look suspicious.
Without SPF:
A: Start with ~all — it’s a soft fail, which means unauthorized emails are flagged but not outright blocked.
Use -all only if you’re 100% sure no other server should send on your behalf.
For most teams, ~all is safer.
A: You’ve got a few options:
Run this in your terminal:
dig txt yourdomain.com
If you've made it this far, you already know this:
Skipping SPF on Google Workspace is a deliverability disaster.
Here’s what you just learned (and probably fixed today):
If you're sending email from a single domain, you’re probably set.
But if you're sending at scale — across multiple domains, campaigns, or cold outreach setups — SPF becomes a bottleneck fast.
In this case, Mailforge can:
👉 Automate SPF, DKIM, DMARC, tracking domains, and mailbox setup — across dozens (or hundreds) of domains.
👉 No DNS headaches. No missed records. Just clean infrastructure built to hit inboxes.
Whether you're a founder, marketer, or ops lead, if you're serious about deliverability, stop patching SPF manually.
Set it up once with Mailforge → and never touch DNS again.