This section describes how to set up, configure, and use the zConsole for supported MobileIron Threat Defense activities.
Figure 1. zConsole Threat Log