Configuring a data protection system
First Claim
1. One or more computer readable storage devices for implementing a computer implemented method for configuring a protected group, the one or more computer readable storage devices having computer program code stored thereon which, when executed by one or more computer processors, cause the processors to perform the method for configuring a protected group, the method comprising:
- obtaining a selection of a Namespace Element;
obtaining protection intents for the selected Namespace Element;
mapping the selected Namespace Element to a protected object;
generating a protected group for the Namespace Element mapped to the protected object;
adding the mapped protected object to the protected group;
creating a schema of the mapping of the Namespace Element to the protected object; and
generating a group plan for protecting the protected group using the protection intents for the selected Namespace Element.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented system configured to describe the relationship between a first Namespace and a second Namespace is provided. The system includes a containment relationship identifying a direct relationship between a first object of the first Namespace and a second object of the first Namespace. Moreover, the system includes a junction relationship linking the second object of the first Namespace to a first object of the second Namespace. In one embodiment, the system is configured to facilitate the recovery of information based on the descriptions of the Namespaces that is maintained.
112 Citations
20 Claims
-
1. One or more computer readable storage devices for implementing a computer implemented method for configuring a protected group, the one or more computer readable storage devices having computer program code stored thereon which, when executed by one or more computer processors, cause the processors to perform the method for configuring a protected group, the method comprising:
-
obtaining a selection of a Namespace Element; obtaining protection intents for the selected Namespace Element; mapping the selected Namespace Element to a protected object; generating a protected group for the Namespace Element mapped to the protected object; adding the mapped protected object to the protected group; creating a schema of the mapping of the Namespace Element to the protected object; and generating a group plan for protecting the protected group using the protection intents for the selected Namespace Element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification