Using the Threat Management Console

This section describes how to set up, configure, and use the Threat Management Console for supported MobileIron Threat Defense activities.

Figure 1. Threat Management Console Threat Log