Cold email infrastructure in 2026 is not complicated, but it is unforgiving. Skip a step and the whole stack silently underperforms — mail lands in spam, bounce rates climb, replies dry up, and you blame the copy. This guide walks through every piece of the pipeline in the order it matters, with specific numbers where we have them.
Assume the goal is a 50-mailbox sending operation for a single agency or in-house outbound team. Adjust the numbers for smaller or larger setups; the shape of the process doesn't change.
Step 1 — Domain strategy
Your primary domain is sacred. Never cold-email from it. One deliverability incident on your main domain will poison your transactional email, your sales team's one-to-one replies, and your customer communications for months.
Buy dedicated cold-email domains instead. Rule of thumb: one sending domain per two to five mailboxes, each domain similar-but-not-identical to your primary. If your main domain is acme.com, you want acme-outbound.com, try-acme.com, hello-acme.com, and so on. Three domains of three mailboxes each is a safer starting shape than one domain of nine mailboxes.
Register each domain at a real registrar with DNSSEC support. Do not use free subdomains or registrars that throttle DNS API calls — you will need those APIs during the warm-up phase.
Step 2 — DNS records, in order
There is a correct order to publish DNS records, and getting it wrong makes debugging harder. Do it this way:
- A / AAAA records for your mail server hostname (mail.acme-outbound.com). Publish before anything else so RDNS has time to propagate.
- MX record pointing at the hostname above.
- SPF record (TXT) listing only the sending IP or hostname. No +all, no ptr mechanism, include chain kept under the 10-lookup limit.
- DKIM public key (TXT at selector._domainkey). 2048-bit minimum. Rotate every 6 months.
- DMARC policy (TXT at _dmarc). Start with p=none and rua reporting to a mailbox you check weekly. Move to quarantine only after two full weeks of clean reports.
- DANE/TLSA record (if your mail server supports it). This is the step most shared platforms skip — it ties your certificate to DNS and proves to the remote MTA that TLS is not a downgrade attack.
- RDNS (PTR) pointing the IP back at the hostname. This is set on the upstream VPS provider side, not in your DNS zone.
Verify every record before moving on. Use at least two independent DNS resolvers (1.1.1.1 and 8.8.8.8, for instance) and two independent dig mirrors. DNS caching will bite you if you trust only one.
Step 3 — Mail server
You need a production-grade mail server: an MTA, an IMAP/POP server, a spam filter, and a TLS certificate manager. Doing this by hand is possible but not a good use of time — it's a two to five day project for an engineer who has done it before, and a much longer one for anyone who hasn't.
The key requirements:
- Strict TLS (no cleartext fallback), with Let's Encrypt or an equivalent automated cert.
- DKIM signing hooked into the MTA outbound path, with per-domain keys.
- Bounce parsing and automatic complaint handling.
- Log retention of at least 30 days for the SMTP logs (you will need this during the warm-up phase).
- IMAP access so sending tools can authenticate normally — avoid APIs that require tool-specific SDKs.
Step 4 — IP reputation check before you send
Before sending the first email, check your IP against the major blocklists. Spamhaus, Barracuda, SORBS, UCEPROTECT, SpamCop. Most VPS providers hand out recycled IPs; the previous owner may have torched the reputation.
If the IP is on a list, request a new one from the upstream before you do anything else. Sending from a blacklisted IP even once tags the domain.
Step 5 — Warm-up
Warm-up is the part where cold email people get superstitious. Here is what actually matters:
- Ramp volume linearly over 14-21 days. Day 1: 10 mails. Day 14: 40-50 mails per mailbox.
- Send to a mix of engaged and cold recipients. If 100% of your day-1 volume is to cold prospects, you're warming up wrong.
- Aim for replies, not opens. A reply is a strong positive signal to every major remote MTA; an open is a weak one and is increasingly faked by bot-scanning email security gateways.
- Watch the SMTP logs. If you see deferrals on specific remote MTAs (a flurry of 421s from Microsoft, for instance), stop ramping and investigate. Don't push through.
Step 6 — Monitoring
Ongoing monitoring is what separates cold-email infrastructure that lasts from cold-email infrastructure that degrades. At minimum:
- Bounce rate per domain, tracked daily. Target under 2%, alert at 4%.
- Complaint rate (FBL reports from ISPs), tracked per mailbox.
- IP reputation checks every 6 hours against the same blocklist set from Step 4.
- DKIM/SPF/DMARC validity checks daily. A silent DNS edit from anyone on your team can take the whole stack down.
Step 7 — Sending tool
Pick any sending tool you like. Instantly, Smartlead, Snov.io, Reply.io, Saleshandy — they all speak IMAP/SMTP, and all of them work on top of properly-configured infrastructure. The tool is the least important decision in this entire list. Swap tools in an afternoon; rebuilding infrastructure takes weeks.
Where SendChief fits
Steps 1-6 take an engineer roughly a week the first time. Doing it across 50 mailboxes and 15 domains takes considerably longer. SendChief runs that entire pipeline — VPS provisioning, mail server install, DNS publication, IP reputation check, warm-up scheduling, monitoring — automatically in under five minutes. Step 7 (the sending tool) stays whatever you were going to use anyway.
If you want to build this yourself and learn by doing it: use this guide. If you want to skip to Step 7: the rest is what we do.