In general, it is recommended to use our whitelisting tool in the dashboard. There you can view the corresponding logs for each step (sending, receiving, interacting) directly.
The configurations we have stored ensure that only our training mails bypass your security systems. Detailed configuration instructions can be found in our knowledge base.