Protection status determinations for computing devices
First Claim
Patent Images
1. A method, comprising:
- interrogating a replication receiver system to determine a backup status for each of a plurality of computing devices;
assigning a protection status to each of the plurality of computing devices based upon a comparison of the backup status and a compliance schema for the plurality of computing devices, the compliance schema comprising a backup schedule which delineates how often a backup is executed for or from a computing device of the plurality of computing devices based upon at least one of a time-bounded interval between backups, a network-connectivity threshold, and an entitlement capacity;
sorting the plurality of computing devices into groups according to their protection statuses;
generating a graphical user interface that includes one or more lists that comprise the plurality of computing devices which have been sorted according to their protection statuses; and
automatically taking a predetermined action with respect to at least one of the plurality of computing devices in the one or more lists based upon the protection statuses.
11 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and media that provide backup protection statuses for computing devices are provided herein. Some methods may include determining a backup status for a first computing device, assigning a protection status for the first computing device based upon a comparison of the backup status and a compliance schema for the first computing device, and transmitting the protection status to a monitoring device utilized by an end user.
-
Citations
19 Claims
-
1. A method, comprising:
-
interrogating a replication receiver system to determine a backup status for each of a plurality of computing devices; assigning a protection status to each of the plurality of computing devices based upon a comparison of the backup status and a compliance schema for the plurality of computing devices, the compliance schema comprising a backup schedule which delineates how often a backup is executed for or from a computing device of the plurality of computing devices based upon at least one of a time-bounded interval between backups, a network-connectivity threshold, and an entitlement capacity; sorting the plurality of computing devices into groups according to their protection statuses; generating a graphical user interface that includes one or more lists that comprise the plurality of computing devices which have been sorted according to their protection statuses; and automatically taking a predetermined action with respect to at least one of the plurality of computing devices in the one or more lists based upon the protection statuses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
one or more processors; and logic encoded in one or more tangible media for execution by the one or more processors and when executed operable to perform operations comprising. interrogating a replication receiver system to determine a backup status for each of a plurality of computing devices; assigning a protection status to each of the plurality of computing devices based upon a comparison of the backup status and a compliance schema for the plurality of computing devices, the compliance schema comprising a backup schedule which delineates how often a backup is executed for or from a computing device of the plurality of computing devices based upon at least one of a time-bounded interval between backups, a network-connectivity threshold, and an entitlement capacity; generating a graphical user interface that includes one or more lists that comprise the plurality of computing devices which have been sorted according to their protection statuses; and automatically taking a predetermined action with respect to at least one of the plurality of computing devices in the one or more lists based upon the protection statuses. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
dynamically modifying, by a replication receiver system, a compliance schema using one or more dynamic thresholds corresponding to computing device workload and network bandwidth availability as detected by the replication receiver system or a filter driver, the compliance schema comprising a backup schedule which delineates how often a backup is executed for or from a computing device of a plurality of computing devices based upon at least one of a time-bounded interval between backups, a network-connectivity threshold, and an entitlement capacity; assigning the compliance schema for the plurality of computing devices; obtaining backup information for the plurality of computing devices; comparing the backup information to the compliance schema; generating a graphical user interface that includes one or more lists that comprise the plurality of computing devices which have been sorted according to their protection statuses; generating a compliance message based upon the comparison; and transmitting the compliance message to a monitoring device.
Specification