This section describes how to set up, configure, and use the Threat Management Console for supported MobileIron Threat Defense activities.
Figure 1. Threat Management Console Threat Log