Getting startedEdit online Components and topologyLearn about Guardium appliances, agents, and other components. Getting started with the user interfaceLearn the basics of the Guardium user interface, including logging in for the first time, banner and navigation menus, and the user interface and data search.Customizing the user interfaceGuardiumĀ® supports customizing the navigation menu for specific users and roles.Identifying and investigating risks: getting startedGuardiumĀ®'s Active Threat Analytics, Risk Spotter, and Investigation Dashboard give you both a bird's eye view of potential risks in your system, risk trends over time, and tools to investigate the potential risks. Incorporate these tools into your daily GuardiumĀ® routine to increase your abilities to identify and manage risks.Smart assistant for monitoring and complianceLearn how to deploy monitoring agents to your database servers and configure database monitoring for compliance with security standards and regulations.System viewThe System View is the default initial view for many users. It enables you to see key elements of system status.Data activity monitoringInformation about key security concepts used in Guardium data activity monitoring.File activity monitoring on Windows and Unix-Linux file serversFile Activity Monitoring discovers the sensitive data on your servers; classifies content using pre-defined or user defined definitions; configures rules and policies about data access, and actions to be taken when rules are met.File activity monitoring for NAS and SharePointGuardium monitors file activity, and perform discovery and classification on NAS devices and SharePoint servers in a Windows environment.Key concepts and toolsInformation about key concepts pertaining to Guardium administration.Related informationIBM Security Guardium product information