In general, it is recommended to use our whitelisting tool in the dashboard. There you can directly view the corresponding logs for each step (send, receive, interact).
The configurations we store ensure that only our training-mails bypass your security systems. You can find detailed instructions for the configuration in our knowledge database.
Please sign in to leave a comment.