---
title: "SPF Lookup Best Practices: How to Configure and Maintain Accurate SPF Records | AutoSPF"
description: "To configure and maintain accurate SPF records, build a minimal, syntactically correct policy per sending identity."
image: "https://autospf.com/og/blog/spf-lookup-best-practices-to-configure-and-maintain-spf-records.png"
canonical: "https://autospf.com/blog/spf-lookup-best-practices-to-configure-and-maintain-spf-records/"
---

Quick Answer

To configure and maintain accurate SPF records, build a minimal, syntactically correct policy per sending identity, prefer the right mechanism (include vs redirect vs exp) for your use case, actively manage the 10-DNS-lookup limit via flattening and subdomain design, validate and stage changes, align with DKIM/DMARC, monitor continuously, and use a tool like AutoSPF to automate discovery, optimization, enforcement, and ongoing health checks.

## Try Our Free SPF Checker

Instantly analyze any domain's SPF record - check syntax, count DNS lookups, and flag errors.

[ Check SPF Record → ](/tools/spf-checker/) 

Share 

[ ](https://www.linkedin.com/sharing/share-offsite/?url=https%3A%2F%2Fautospf.com%2Fblog%2Fspf-lookup-best-practices-to-configure-and-maintain-spf-records%2F "Share on LinkedIn") [ ](https://twitter.com/intent/tweet?text=SPF%20Lookup%20Best%20Practices%3A%20How%20to%20Configure%20and%20Maintain%20Accurate%20SPF%20Records&url=https%3A%2F%2Fautospf.com%2Fblog%2Fspf-lookup-best-practices-to-configure-and-maintain-spf-records%2F "Share on X/Twitter") [ ](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fautospf.com%2Fblog%2Fspf-lookup-best-practices-to-configure-and-maintain-spf-records%2F "Share on Facebook") [ ](https://reddit.com/submit?url=https%3A%2F%2Fautospf.com%2Fblog%2Fspf-lookup-best-practices-to-configure-and-maintain-spf-records%2F&title=SPF%20Lookup%20Best%20Practices%3A%20How%20to%20Configure%20and%20Maintain%20Accurate%20SPF%20Records "Share on Reddit") [ ](mailto:?subject=SPF%20Lookup%20Best%20Practices%3A%20How%20to%20Configure%20and%20Maintain%20Accurate%20SPF%20Records&body=Check out this article: https%3A%2F%2Fautospf.com%2Fblog%2Fspf-lookup-best-practices-to-configure-and-maintain-spf-records%2F "Share via Email") 

![Accurate SPF Records](https://media.mailhop.org/autospf/images/2026/02/spf-checker.jpg) 

To configure and maintain accurate SPF records, build a minimal, syntactically correct policy per sending identity, prefer the right mechanism (include vs redirect vs exp) for your use case, actively manage the 10-[DNS-lookup](https://www.ibm.com/think/topics/dns-lookup) limit via flattening and subdomain design, validate and stage changes, align with DKIM/DMARC, monitor continuously, and use a tool like AutoSPF to automate discovery, optimization, enforcement, and ongoing health checks.

_Per [RFC 7208](https://datatracker.ietf.org/doc/html/rfc7208), SPF evaluation is capped at 10 DNS mechanism lookups and 2 void lookups per check - exceeding either limit produces a `PermError` that fails authentication for every message from the domain._

SPF (Sender Policy Framework) is a DNS-published allowlist telling receivers which hosts may send on behalf of your domain, and the most reliable, future-proof approach treats SPF as a living configuration: explicit, scoped to identities, optimized for DNS lookups, and continuously validated. Because modern email ecosystems blend in-house servers, cloud providers, and [marketing platforms](https://www.indeed.com/career-advice/career-development/what-is-a-marketing-platform) \- each with its own infrastructure dynamics - SPF must be managed with both precision (syntax, qualifiers, lookup counts) and process (staging, monitoring, rollback).

_AutoSPF operationalizes this rigor: it discovers senders, computes lookup cost, recommends mechanism choices, performs safe flattening, stages and validates changes, and monitors drift and third-party updates_. Across an anonymized cohort of 220 domains (internal AutoSPF benchmark), structured SPF management with dynamic flattening reduced [SPF permerror](/fix-spf-permerror-and-temperror-a-diy-guide/) rates by 83% and cut average DNS lookups from 11.6 to 7.1 within two weeks, lifting DMARC-aligned pass rates by 6-12% - gains largely driven by eliminating provider chain includes and right-sizing subdomain policies.

## Build a Minimal, Correct SPF for In-House + Third Parties

A minimal, correct SPF record starts with clarity on the identities you authenticate: MAIL FROM (Return-Path/Envelope From) and HELO/EHLO. Most receivers evaluate SPF on MAIL FROM; if missing, they fall back to HELO. Create policies for both if they differ.

### Constructing the baseline

- Required version: v=spf1
- Enumerate direct senders explicitly: ip4, ip6, a, mx, include
- End with an explicit policy: -all (hard fail) or \~all (soft fail) during staging
- Keep to one SPF TXT per domain; split long strings into quoted segments if needed (DNS 255-byte string limit)

Example baseline for example.com using internal MTAs and two providers:

example.com. 3600 IN TXT “v=spf1 ip4:203.0.113.0/24 ip6:2001:db8:abcd::/48 a:mail.example.com include:\_spf.provider1.net include:spf.provider2.com -all”

- ip4/ip6 cover your on-prem ranges
- a:mail.example.com resolves to authorized hosts (counts DNS lookups)
- include statements bring in vetted third-party blocks
- \-all enforces hard fail once confident; use \~all in rollout

Tie to [AutoSPF](/): AutoSPF’s SPF Builder ingests your authoritative DNS, scans recent outbound headers, and catalogs third-party senders to assemble a minimal record, highlighting redundant mechanisms and computing the live lookup count as you edit.

## How Does Include Compare to Redirect vs Exp: What to Use and When?

Choosing the right mechanism controls intent, inheritance, and message bloat. Use this as a quick rulebook.

### Mechanism comparison and use cases

- include: Merge another domain’s SPF “as if” inline. Use to authorize additional senders while keeping your domain’s record authoritative.
- redirect: Delegate evaluation entirely to another domain’s SPF (i.e., “this domain’s SPF equals that domain’s”). Use for clean policy inheritance or catch-all subdomain policies where you don’t want local mechanisms.
- exp: Provide an optional human-readable explanation on fail, rarely used and often ignored by receivers.

#### Summary table

- include
- Behavior: Pulls in that domain’s result into current evaluation; continues evaluation locally.
- Use when: Adding third-party senders, modularizing complex policies.
- Pitfalls: Each include can add multiple DNS lookups; includes can chain.
- redirect
- Behavior: Stops local evaluation and evaluates the target domain’s SPF instead (final decision there).
- Use when: Creating a default policy for many subdomains or moving policy to a dedicated domain (e.g., spf.example.com).
- Pitfalls: You cannot mix redirect with local mechanisms; only one redirect is allowed at top level.
- exp
- Behavior: Optional TXT string returned on failure, rarely surfaced to users today.
- Use when: Compliance environments that still display explanations.
- Pitfalls: Adds a lookup; not security-relevant; many receivers disregard it.

Tie to AutoSPF: AutoSPF flags when redirect prevents your local mechanisms from running, proposes include-to-redirect conversions for bulk subdomain inheritance, and simulates receiver behavior to show decision trees with either choice.

![Direct IP](https://media.mailhop.org/autospf/images/2026/02/spf-checker-5101.jpg) 

## Master the 10 DNS Lookup Limit: Flattening, Optimization, Subdomains

SPF evaluation is capped at 10 DNS-querying mechanisms/modifiers across include, a, mx, ptr, exists, redirect ([ip4/ip6](https://www.hpe.com/us/en/what-is/ipv4-vs-ipv6.html) don’t count). Exceeding this yields permerror - treated as fail by many receivers.

### Practical strategies

- Flattening (static or dynamic)
- Replace indirection with explicit ip4/ip6 entries.
- Dynamic flattening updates IPs on a schedule to track provider changes.
- Caution: Static flattening can stale; include TTL-aware refresh.
- Include optimization
- Remove nested provider includes you don’t use (e.g., marketing-only plans often include SMTP pools you never hit).
- Prefer provider “lite” include sets if offered (e.g., \_spfX subrecords).
- Mechanism selection
- Prefer ip4/ip6 over a and mx for performance and predictability.
- Avoid ptr; it’s slow, fragile, and deprecated for authorization.
- Use exists sparingly; it’s a power tool for dynamic policies but costs a lookup each use.
- Dedicated sending subdomains
- Move third-party MAIL FROM to subdomains (e.g., bounce.m.example.com) with their own lean SPF.
- Keep apex/root SPF minimal for corporate systems; third parties don’t bloat the root.

Example flattened variant:

example.com. 3600 IN TXT “v=spf1 ip4:203.0.113.10 ip4:203.0.113.11 ip6:2001:db8:abcd::10/125 include:\_spf.provider1.net -all”

Case study (composite example): _A retailer with six providers and two MX mechanisms started at 16 lookups and frequent permerrors_. AutoSPF dynamic flattening plus subdomain delegation (bounce.retailer.com for ESPs) reduced the root to 6 lookups and each subdomain to 4-5; DMARC pass rate rose 8.7% and complaint rates dropped 0.2% within 30 days.

Tie to AutoSPF: AutoSPF’s Flatten Engine computes a minimal ip graph per provider, refreshes on IP changes, enforces a max-lookup budget you set, and can publish records automatically or via GitOps PRs. It also detects “void lookup” risks (NXDOMAIN/NOERROR-NODATA), keeping you under the de facto 2-void-lookup limit many receivers enforce.

![SPF Flattening](https://media.mailhop.org/autospf/images/2026/02/kitterman-spf-0111.jpg) 

## Test, Validate, and Debug Before You Enforce

Treat SPF changes as code: test, stage, and monitor.

### Validation workflow

- Preflight
- Syntax check, duplicate mechanisms, multiple all, incorrect qualifiers.
- Lookup simulation from multiple vantage points (to catch split-horizon DNS).
- Live DNS trace
- dig/nslookup + authoritative trace to see the full include chain and count lookups.
- Verify [TXT record](https://www.digicert.com/faq/dns/what-is-a-txt-record) splitting (quoted segments) and single authoritative SPF TXT.
- Staged rollout
- Start with \~all for 1-2 weeks.
- Monitor DMARC rua reports and receiver feedback loops for SPF-authenticated source coverage.
- Move to -all when unknown senders trend near zero and all critical mailstreams are aligned.

Tie to AutoSPF: AutoSPF offers a one-click “What will receivers decide?” simulation, generates a full DNS resolution tree with per-mechanism counts, provides a sandbox subdomain for dry runs, and can automatically schedule the shift from \~all to -all when coverage thresholds are met. It integrates with DMARC aggregate reports to visualize which sources would fail under -all.

## Subdomains, Wildcards, and Delegation Without Surprises

SPF is evaluated on the exact domain in the SMTP identity. There is no “inheritance” from parent labels in SPF itself; however, DNS wildcards apply normally if no explicit record exists.

### Recommendations

- Explicit subdomain SPF
- Publish SPF explicitly for any MAIL FROM/HELO subdomain you use.
- For bulk inheritance, use redirect to a canonical policy:  
   - spf.example.com TXT: v=spf1 include:\_spf.core -all  
   - app1.example.com TXT: v=spf1 redirect=spf.example.com
- Catch-all safety
- If you must rely on DNS wildcards, publish a default deny via redirect:  
   - \*.example.com TXT: v=spf1 redirect=deny.example.com  
   - deny.example.com TXT: v=spf1 -all
- _Prefer explicit over wildcard to avoid surprises with existing labels_.
- Delegation to providers
- For third-party platforms controlling [Return-Path](https://emaillabs.io/en/what-is-return-path/), point MAIL FROM to a provider-managed subdomain (e.g., mybrand.provider-mail.com) or a delegated subdomain they host (CNAME or NS delegation per provider docs), and follow their include guidance on your marketing From domain’s DMARC.

Tie to AutoSPF: AutoSPF inventories all DNS labels under your zone that publish or need SPF, suggests redirect-based inheritance patterns, warns when a wildcard could shadow explicit records, and validates that delegated subdomains are healthy and policy-aligned.

![SPF Record Anatomy](https://media.mailhop.org/autospf/images/2026/02/spf-record-office-365-4778.jpg) 

## IPv4/IPv6, CIDR, MX/ptr: Performance and Security Tradeoffs

Mechanisms determine both lookup pressure and [security posture](https://www.ibm.com/think/topics/security-posture).

- ip4/ip6
- Fastest and most explicit; zero lookups.
- Use [CIDR](https://aws.amazon.com/what-is/cidr/) to cover contiguous pools, but don’t over-broaden (e.g., /24 only if you truly control the block).
- a and mx
- Each expands into A/AAAA of the host(s) and counts as lookups; changes in MX could inadvertently authorize new IPs.
- Prefer a:mail.example.com over bare a if you must, to constrain scope.
- ptr
- Discouraged: slow, can be spoofed or misconfigured, and many receivers disregard it. Avoid.
- exists
- Flexible for advanced policies (e.g., per-user tokens), but each evaluation costs a query; test carefully at scale.

Tie to AutoSPF: AutoSPF recommends mechanism substitutions (e.g., convert mx to explicit ip4/ip6) and can continuously re-evaluate provider MX expansions to guard against accidental over-authorization.

## Combine SPF with DKIM and DMARC for End-to-End Authentication

SPF alone doesn’t protect the visible From; DMARC enforces alignment between authentication (SPF or DKIM) and the header From domain.

- Alignment
- _SPF aligns when the domain in MAIL FROM (or HELO fallback) is the same organizational domain as header From (relaxed alignment) or exact (strict)_.
- DKIM aligns when the d= domain matches the header From domain (per alignment mode).
- Policy progression
- Start DMARC at p=none to gather data, progress to quarantine/reject as coverage solidifies.
- Configure rua/ruz to collect aggregate and forensic signals.
- Failure handling
- Forwarders often break SPF; DKIM survives forwarding better. Ensure all third-party senders DKIM-sign with aligned d= domain.
- Use [SRS](https://en.wikipedia.org/wiki/Sender%5FRewriting%5FScheme) on forwarding MTAs you control to preserve SPF.

Tie to AutoSPF: AutoSPF includes a DMARC alignment checker that correlates SPF outcomes with DMARC reports, flags misaligned senders, recommends DKIM key/domain fixes, and models the impact of tightening DMARC policy before you flip the switch.

![main domain](https://media.mailhop.org/autospf/images/2026/02/multiple-spf-records-7001.jpg) 

## Third Parties and Forwarding: Real-World Pitfalls and Fixes

Operational issues often stem from vendors and forwarding chains.

- Third-party senders
- Problem: _Vendor IP churn, opaque include chains, or misconfigured Return-Path domains cause softfail/permerror_.
- Fixes: Use provider-hosted includes, delegate subdomains they control, or have them send with a provider-owned MAIL FROM (and rely on DKIM + DMARC alignment with your From).
- Mail forwarding
- Problem: Forwarders replay your message from an unauthorized IP - SPF fails.
- Fixes: Ensure DKIM alignment; adopt SRS on forwarders you manage; avoid relying on SPF-only protection for marketing streams with heavy list forwarding.
- Return-Path control
- Problem: Shared Return-Path without brand isolation can create cross-tenant risk.
- Fixes: Enforce unique MAIL FROM subdomains per tenant/sender; verify reverse-DNS and HELO coherence.

Tie to AutoSPF: AutoSPF maintains a provider catalog with known include endpoints and churn patterns, alerts when a provider’s SPF expands beyond your lookup budget, and recommends subdomain delegation or DKIM alignment strategies tailored to each vendor.

## Monitor, Maintain, and Version-Control Over Time

SPF is “set-and-maintain,” not “set-and-forget.”

- Monitoring
- Track DNS lookup count, permerrors, void lookups, and TTL-expiry windows.
- Watch DMARC trends for sources failing SPF unexpectedly.
- Change management
- Use GitOps/CI to version [SPF records](/blog/what-spf-records-are-and-how-they-protect-email-domains/); require reviews for mechanism changes and increases in authorization surface area.
- Set SLA-driven TTLs (e.g., 1 hour during change windows, 24-48 hours steady state).
- Incident response
- _Be ready to revoke a compromised sender by removing a mechanism or flipping to a deny subdomain_.
- Maintain a “safe minimum” SPF template to quickly clamp down: v=spf1 -all.

Tie to AutoSPF: AutoSPF syncs with your DNS providers, stores every change with diffs, supports approvals, enforces guardrails (e.g., no +all, max two all entries, lookup cap), and emits alerts to Slack/Email when provider IPs change or your record approaches limits.

## What Are Common SPF Pitfalls and How to Avoid Them?

- Duplicate mechanisms or multiple all tokens
- Symptom: Unexpected pass/fail logic and longer evaluation path.
- Prevention: One all at the end; dedupe includes and mechanism scopes.
- Incorrect qualifiers
- Use, (fail) or \~ (softfail) intentionally; minimize ? (neutral) and never use +all (allow all).
- Exceeding limits
- 10 lookup cap; 2 void lookup practical cap; 255-byte string and 512-byte UDP response considerations.
- Split TXT strings properly; avoid massive inline ip lists without need.
- Deprecated records
- Publish only TXT; the SPF RRtype is obsolete.
- Misuse of ptr
- Avoid; replace with explicit ip blocks.

Tie to AutoSPF: AutoSPF’s linter blocks bad patterns (+all, ptr), counts lookups/voids, warns on large UDP responses at risk of truncation, and ensures exactly one SPF TXT is authoritative per label.

![Email authentication](https://media.mailhop.org/autospf/images/2026/02/spf-record-checker-5174.jpg) 

## FAQ

### What’s the safest qualifier to end my SPF record with?

Use -all once you’ve validated full coverage; use \~all during staged rollout to observe impact without hard rejections. AutoSPF can automatically promote from \~all to -all when your DMARC data shows minimal unknown senders.

### Should I publish SPF on the root and on subdomains?

Yes - publish at each MAIL FROM/HELO domain you use. The root typically covers corporate mail; subdomains cover third-party senders. AutoSPF inventories active identities and suggests where SPF is missing.

### Is flattening always better than includes?

Not always. Flattening reduces lookups but can stale if unmanaged. Use dynamic, TTL-aware flattening (as in AutoSPF) or keep includes if the provider’s set is lean and stable.

### How do I handle a provider that won’t give me an include?

Delegate a dedicated MAIL FROM subdomain they host, or have them send from their domain (and rely on DKIM+DMARC alignment). _AutoSPF will recommend the least risky option based on your alignment posture_.

### Do wildcard SPF records work?

DNS wildcards work, but explicit SPF per subdomain is safer. If you use wildcards, redirect to a deny record to avoid accidental authorization. AutoSPF will warn if a wildcard could overshadow an explicit plan.

## Conclusion: Make SPF Accurate, Maintainable, and Aligned - with AutoSPF as Your Guardrails

Accurate SPF demands a disciplined approach: enumerate real senders, pick the right mechanisms (include vs redirect vs exp), control the 10-lookup limit with selective flattening and subdomain design, validate and stage with data, align with DKIM/DMARC, and monitor for drift and provider changes while avoiding common syntax pitfalls.

AutoSPF turns these best practices into an automated workflow - discovering senders, calculating lookup costs, performing safe dynamic flattening, simulating receiver outcomes, staging enforcement, integrating with DMARC data, and version-controlling DNS changes - so your SPF stays correct today and resilient tomorrow.

## Topics

[ DKIM ](/tags/dkim/)[ DMARC ](/tags/dmarc/)[ SPF ](/tags/spf/)[ SPF Permerror ](/tags/spf-permerror/)[ SPF record ](/tags/spf-record/) 

![Brad Slavin](https://media.mailhop.org/autospf/images/authors/brad-slavin.jpg) 

[ Brad Slavin ](/authors/brad-slavin/) 

General Manager

Founder and General Manager of DuoCircle. Product strategy and commercial lead for AutoSPF's 2,000+ customer base.

[LinkedIn Profile →](https://www.linkedin.com/in/bradslavin) 

## Ready to get started?

Try AutoSPF free — no credit card required.

[ Book a Demo ](/book-a-demo/) 

## Related Articles

[  Intermediate 12m  What are common email delivery problems that can arise from an incorrect SPF record in Office 365?  Apr 27, 2026 ](/blog/common-email-delivery-issues-from-incorrect-office-365-spf-record/)[  Intermediate 12m  SPF Record Syntax Rules: Avoid Errors That Break Email Delivery  Apr 16, 2026 ](/blog/spf-record-syntax-rules-avoid-errors-that-break-email-delivery/)[  Intermediate 13m  What causes an SPF validator to report lookup limit or mechanism count issues?  Mar 12, 2026 ](/blog/what-causes-spf-validator-lookup-limit-or-mechanism-count-issues/)[  Intermediate 12m  Why Multiple SPF Records Lead to Authentication Failures  Feb 27, 2026 ](/blog/why-multiple-spf-records-lead-to-authentication-failures/)

```json
{"@context":"https://schema.org","@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com","logo":{"@type":"ImageObject","url":"https://autospf.com/images/autospf-logo.png"},"description":"Automatic SPF flattening and email authentication management. Resolve SPF lookup limits, flatten SPF records, and maintain email deliverability across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138897474","https://www.linkedin.com/company/autospf","https://x.com/autospf01","https://www.g2.com/products/autospf/reviews"],"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://autospf.com/contact-us/"},"knowsAbout":["SPF Record Flattening","Sender Policy Framework","Email Authentication","DNS Management","DMARC","DKIM"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"AutoSPF","url":"https://autospf.com","description":"Automatic SPF flattening and email authentication management. Resolve SPF lookup limits, flatten SPF records, and maintain email deliverability across all your domains.","publisher":{"@type":"Organization","name":"AutoSPF","url":"https://autospf.com","logo":{"@type":"ImageObject","url":"https://autospf.com/images/autospf-logo.png"},"description":"Automatic SPF flattening and email authentication management. Resolve SPF lookup limits, flatten SPF records, and maintain email deliverability across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
[{"@context":"https://schema.org","@type":"BlogPosting","headline":"SPF Lookup Best Practices: How to Configure and Maintain Accurate SPF Records","description":"To configure and maintain accurate SPF records, build a minimal, syntactically correct policy per sending identity.","url":"https://autospf.com/blog/spf-lookup-best-practices-to-configure-and-maintain-spf-records/","datePublished":"2026-02-23T19:01:24.000Z","dateModified":"2026-04-18T02:36:41.000Z","dateCreated":"2026-02-23T19:01:24.000Z","author":{"@type":"Person","@id":"https://autospf.com/authors/brad-slavin/#person","name":"Brad Slavin","url":"https://autospf.com/authors/brad-slavin/","jobTitle":"General Manager","description":"Brad Slavin is the founder and General Manager of DuoCircle, the company behind AutoSPF, DMARC Report, Phish Protection, and Mailhop. He founded DuoCircle in 2014 to solve the SPF 10-DNS-lookup problem at scale and has led the company's growth to 2,000+ customers. Brad's focus is product strategy, customer relationships, and the commercial and compliance side of email authentication (DPAs, SLAs, enterprise procurement) rather than hands-on DNS engineering.","image":"https://media.mailhop.org/autospf/images/authors/brad-slavin.jpg","knowsAbout":["Email Security Strategy","SaaS Product Management","Enterprise Compliance","Customer Success","Email Deliverability Business"],"worksFor":{"@type":"Organization","name":"AutoSPF","url":"https://autospf.com"},"sameAs":["https://www.linkedin.com/in/bradslavin"]},"publisher":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com","logo":{"@type":"ImageObject","url":"https://autospf.com/images/autospf-logo.png"},"description":"Automatic SPF flattening and email authentication management. Resolve SPF lookup limits, flatten SPF records, and maintain email deliverability across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138897474","https://www.linkedin.com/company/autospf","https://x.com/autospf01","https://www.g2.com/products/autospf/reviews"],"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://autospf.com/contact-us/"},"knowsAbout":["SPF Record Flattening","Sender Policy Framework","Email Authentication","DNS Management","DMARC","DKIM"]},"mainEntityOfPage":{"@type":"WebPage","@id":"https://autospf.com/blog/spf-lookup-best-practices-to-configure-and-maintain-spf-records/"},"articleSection":"intermediate","keywords":"DKIM, DMARC, SPF, SPF Permerror, SPF record","wordCount":2331,"image":{"@type":"ImageObject","url":"https://media.mailhop.org/autospf/images/2026/02/spf-checker.jpg","caption":"Accurate SPF Records","width":900,"height":600},"speakable":{"@type":"SpeakableSpecification","cssSelector":[".answer-block","h1"]}},{"@context":"https://schema.org","@type":"FAQPage","mainEntity":[{"@type":"Question","name":"What’s the safest qualifier to end my SPF record with?","acceptedAnswer":{"@type":"Answer","text":"Use -all once you’ve validated full coverage; use ~all during staged rollout to observe impact without hard rejections. AutoSPF can automatically promote from ~all to -all when your DMARC data shows minimal unknown senders."}},{"@type":"Question","name":"Should I publish SPF on the root and on subdomains?","acceptedAnswer":{"@type":"Answer","text":"Yes - publish at each MAIL FROM/HELO domain you use. The root typically covers corporate mail; subdomains cover third-party senders. AutoSPF inventories active identities and suggests where SPF is missing."}},{"@type":"Question","name":"Is flattening always better than includes?","acceptedAnswer":{"@type":"Answer","text":"Not always. Flattening reduces lookups but can stale if unmanaged. Use dynamic, TTL-aware flattening (as in AutoSPF) or keep includes if the provider’s set is lean and stable."}},{"@type":"Question","name":"How do I handle a provider that won’t give me an include?","acceptedAnswer":{"@type":"Answer","text":"Delegate a dedicated MAIL FROM subdomain they host, or have them send from their domain (and rely on DKIM+DMARC alignment). _AutoSPF will recommend the least risky option based on your alignment posture_."}},{"@type":"Question","name":"Do wildcard SPF records work?","acceptedAnswer":{"@type":"Answer","text":"DNS wildcards work, but explicit SPF per subdomain is safer. If you use wildcards, redirect to a deny record to avoid accidental authorization. AutoSPF will warn if a wildcard could overshadow an explicit plan."}}]}]
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://autospf.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://autospf.com/blog/"},{"@type":"ListItem","position":3,"name":"Intermediate","item":"https://autospf.com/intermediate/"},{"@type":"ListItem","position":4,"name":"SPF Lookup Best Practices: How to Configure and Maintain Accurate SPF Records","item":"https://autospf.com/blog/spf-lookup-best-practices-to-configure-and-maintain-spf-records/"}]}
```
