Systems and method for leveraging backup metadata to provide granular options for data protection

ABSTRACT

A method for performing a backup includes: obtaining a file system backup metadata associated with a target file system of a target production host; processing the file system backup metadata to determine protected data and unprotected data in the target file system; after processing the file system backup metadata, using the file system backup metadata to generate a backup history dataset for the target file system; generating a protection status for each data in the target file system based on the backup history dataset and the determined protected data and unprotected data of the target file system; generating a graphical user interface (GUI) for the target file system showing the data of the target file system along with the protection status of each of the data of the target file system; and displaying, on a display of a computing device and to a user, the GUI.

BACKGROUND

As people increasingly rely on computing systems and devices to perform a plethora of tasks; the systems have become increasingly complex, and the opportunities for failure and/or loss of important data has also increased. To prevent loss of important data, performing a backup on the file system of a computing system is necessary to prevent loss of data if a system failure occurs or cyberattacks such as ransomware are directed towards the system. File system backups leverage a file-based backup philosophy to protect the underlying data. This underlying mechanism is leveraged not just to protect the file system on a host, but also to protect workflows in network attached storage.

BRIEF DESCRIPTION OF DRAWINGS

Certain embodiments of the invention will be described with reference to the accompanying drawings. However, the accompanying drawings illustrate only certain aspects or implementations of the invention by way of example and are not meant to limit the scope of the claims.

FIG. 1 shows a diagram of a system in accordance with one or more embodiments of the invention.

FIG. 2 shows a diagram of a backup system in accordance with one or more embodiments of the invention.

FIG. 3 shows a flowchart of a method of generating a backup in accordance with one or more embodiments of the invention.

FIG. 4 shows a flowchart of a method of alerting a user if a file is not backed up over predetermined time in accordance with one or more embodiments of the invention.

FIG. 5 shows a diagram of a computing device in accordance with one or more embodiments of the invention.

FIG. 6 shows a flow chart in accordance with one or more embodiments of the invention.

FIG. 7 shows an implementation example in accordance with one or more embodiments of the invention.

DETAILED DESCRIPTION

In the following description of the figures, any component described with regards to a figure, in various embodiments of the invention, may be equivalent to one or more like-named components described with regards to any other figure. For brevity, descriptions of these components will not be repeated with regards to each figure. Thus, every embodiment of the components of each figure is incorporated by reference and assumed to be optionally present within every other figure having one or more like-named components. Additionally, in accordance with various embodiments of the invention, any description of the components of a figure is to be interpreted as an optional embodiment, which may be implemented in addition to, in conjunction with, or in place of the embodiments described with regards to a corresponding like-named component in any other figure.

Throughout this application, elements of figures may be labeled as A to N. As used herein, the aforementioned labeling means that the element may include any number of items, and does not require that the element include the same number of elements as any other item labeled as A to N. For example, a data structure may include a first element labeled as A and a second element labeled as N. This labeling convention means that the data structure may include any number of the elements. A second data structure, also labeled as A to N, may also include any number of elements. The number of elements of the first data structure, and the number of elements of the second data structure, may be the same or different.

Throughout the application, ordinal numbers (e.g., first, second, third, etc.) may be used as an adjective for an element (i.e., any noun in the application). The use of ordinal numbers is not to imply or create any particular ordering of the elements nor to limit any element to being only a single element unless expressly disclosed, such as using the terms “before,” “after,” “single,” and other such terminology. Rather, the use of ordinal numbers is to distinguish between the elements. By way of an example, a first element is distinct from a second element, and the first element may encompass more than one element and succeed (or preceded) the second element in an ordering of elements.

As used herein, the phrase operatively connected, or operative connection, means that there exists between elements/components/devices a direct or indirect connection that allows the elements to interact with one another in some way. For example, the phrase ‘operatively connected’ may refer to any direct connection (e.g., wired directly between two devices or components) or indirect connection (e.g., wired and/or wireless connections between any number of devices or components connecting the operatively connected devices). Thus, any path through which information may travel may be considered an operative connection.

In general, a backup (e.g., a full backup, an incremental backup, etc.) may include files and/or folders that are skipped for various reasons. Embodiments of the invention relate to methods and systems for cataloging and informing a user or administrator of those files and folders that have been skipped. More specifically, various embodiments of the invention may determine, after crawling a file system for performing a backup, that specific files and/or folders will not be backed up. The aforementioned information may be stored, e.g., in a file, as a list of files and/or folders that will not be backed up along with other meta-data. The file can be used to notify a user or administrator. This advantageously provides the user or administrator knowledge of gaps in the protection provided by a backup.

The following describes various embodiments of the invention.

FIG. 1 shows a diagram of a system in accordance with one or more embodiments of the invention. The system includes backup agents (102), production hosts (104)-(106), a backup storage device (116), a remote agent (118) and clients (130). The system may include additional, fewer, and/or different components without departing from scope of the invention. Each component may be operably connected to any of the other component via any combination of wired and/or wireless connections. Each component illustrated in FIG. 1 is discussed below.

In one or more embodiments of the invention, the backup agents (102A-102N) may generate and provide to the backup storage device (116) the backups and the historical meta-data based on backup policies implemented by the backup agent (102). The backup policies may specify a schedule in which the applications (e.g., 114) or other assets associated with the applications are to be backed up. The backup agent (102) may be triggered to generate a backup and historical meta-data and provide the backup and historical meta-data to the backup storage device (116) in response to a backup policy. Alternatively, backup, and historical meta-data may be generated by the backup agent (102) and provided to the backup storage device (116) in response to a backup request triggered by the client(s) (100). The backup request may specify the applications(s) (114) and/or assets associated with the applications (114) to be backed up.

In one or more embodiments of the invention, the backup agent (102) is a physical device. The physical device may include circuitry. The physical device may be, for example, a field-programmable gate array, application specific integrated circuit, programmable processor, microcontroller, digital signal processor, or other hardware processor. The physical device may be adapted to provide the functionality of the backup agent (102) described throughout this application.

In one or more embodiments of the invention, the backup agent (102) is implemented as computer instructions, e.g., computer code, stored on a persistent storage that when executed by a processor of the production hosts (104)-(106) causes the production hosts (104)-(106) to provide the functionality of the backup agents (102) described throughout this application.

In one or more embodiments of the invention, the production host (104)-(106), hosts one or more applications (112)-(114). In one or more embodiments of the invention, the application(s) (112)-(114) perform computer implemented services for clients (e.g., 130). Performing the computer implemented services may include performing operations on asset data that is stored in the production host (e.g., 104). The operations may include creating elements of assets, moving elements of assets, modifying elements of assets, deleting elements of assets, and other and/or additional operations on asset data without departing from the invention. The application(s) (112)-(114) and/or users of the client(s) (130) may include functionality for performing the aforementioned operations on the asset data in the production host (104)-(106). The application(s) (112)-(114) may be, for example, instances of databases, email servers, and/or other applications. The production host (104)-(106) may host other types of applications without departing from the invention.

In one or more of embodiments of the invention, the application(s) (112)-(114) is implemented as computer instructions, e.g., computer code, stored on a persistent storage that when executed by a processor(s) of the production hosts (104)-(106) cause the production host (104)-(106) to provide the functionality of the application(s) (112)-(114) described throughout this application.

The production hosts (104)-(106) may include physical storage or logical storage that will be discussed in more detail with regards to FIG. 2 . The logical storage devices (e.g., virtualized storage) may utilize any quantity of hardware storage resources of any number of computing devices for storing data. For example, the persistent storage may utilize portions of any combination of hard disk drives, solid state disk drives, tape drives, and/or any other physical storage medium of any number of computing devices.

In one or more embodiments of the invention, the backup agents (102) may be a portion of the remote agents (118). The remote agents (118) and/or backup agents (102) may provide backup services to the production hosts (104)-(106). The backup services may include generation and storage of backups in the backup storage device (116). The backups services may also include restoration of the production hosts (104)-(106) using the backups stored in the backup storage device (116).

The remote agents (118) may provide backup services to the production hosts (104)-(106) by orchestrating: (i) generation of backups of the production hosts (104)-(106), (ii) storage of backups (128A)-(128N) of the production hosts (104)-(106) in the persistent storage system (128) of the backup storage device (116), (iii) consolidation of backup requests to reduce or prevent from generation of backups that are not useful for restoration purposes, and (iv) restoration of the production hosts (104)-(106) to previous states using backups (128A)-(128N) stored in the persistent storage system (128) of the backup storage device (116). The system may include any number of remote agents (e.g., 102A, 102N) without departing from the scope of the invention.

Additionally, to provide the backup services, the remote agent (118) may include functionality to generate and issue instructions to any component of the system of FIG. 1 . In one or more embodiments, the remote agent (118) may also generate instructions in response to backup requests from other entities.

In one or more embodiments of the invention, the remote agent (118) may generate such instructions in accordance with backup schedules that specify when backups are to be generated. In one or more embodiments, a backup schedule may lay out specific points in time for a backup process to be performed.

In one or more embodiments of the invention, to satisfy the above-discussed backup schedules, the remote agent (118) may monitor a backup window (e.g., 4 hours, 8 hours, etc.) to perform a single backup and/or multiple backups. Additionally, the remote agent (118) may pause an ongoing backup if the backup exceeded the backup window. The remote agent (118) may then resume the paused backup while performing a next backup in a parallel manner based on the backup schedule.

In one or more embodiments of the invention, the backup storage device (116) may provide data storage services. For example, the backup storage device (116) may store backups of the production hosts (104)-(106) in persistent storage system (128). The persistent storage system (128) may also provide copies of the latest backup N (128N) previously stored backups (128A) of the production hosts (104)-(106). The system may include any number of backup storage devices (116) and backups (128A)-(128N) without departing from the scope of the invention.

In one or more embodiments of the invention, the backup storage device (116) and persistent storage system (128) may be implemented as computing devices (e.g., 500, FIG. 5 ). A computing device may be, for example, a mobile phone, a tablet computer, a laptop computer, a desktop computer, a server, a distributed computing system, or a cloud resource. The computing device may include one or more processors, memory (e.g., random access memory), and persistent storage (e.g., disk drives, solid-state drives, etc.). The computing device may include instructions, stored on the persistent storage, that when executed by the processor(s) of the computing device, cause the computing device to perform the functionality of the backup storage device (116) described throughout this application. Alternatively, in one or more embodiments of the invention, the backup storage devices (116) may also be implemented as logical devices, as discussed above.

In one or more embodiments of the invention, the production hosts (104)-(106) may provide services to the clients (130). For example, the production hosts (104)-(106) may host any number of applications that provide application services to the clients (130). Application services may include, but are not limited to database services, electronic communication services, instant messaging services, file storage services, etc.

In one or more embodiments of the invention, each of the production hosts (e.g., 104-106) may provide the above-discussed application services by hosting applications. Each of the production hosts may host any number of applications. Additionally, different production hosts may host the same number of applications or different numbers of applications. Different production hosts may also host similar or different applications.

In one or more embodiments of the invention, the production hosts (104)-(106) may host virtual machines (VMs, e.g., 108-110) that host the above-discussed applications. Each of the production hosts (104)-(106) may host any number of VMs that, in turn, host any number of applications.

In one or more embodiments of the invention, the production hosts (104)-(106) may perform portions of a backup process. For example, the production hosts (104)-(106) may initiate backups under the direction of the remote agent (118) or backup agents (102). In one or more embodiments, the production hosts (104)-(106) may include functionality to consolidate multiple backup generation requests so that duplicative backups are not generated, because the duplicative backups may not be useful for restoration purposes.

In one or more embodiments of the invention, the production hosts (104)-(106) may include functionality to initiate multiple backups in a parallel manner For example, the production hosts (104)-(106) may each host multiple backup processes that each manages the initiation of a respective backup. Each of the multiple backup processes may operate concurrently thereby causing multiple backups to be initiated in a parallel manner

In one or more embodiments of the invention, the production hosts (104)-(106) may be implemented as computing devices (e.g., 500, FIG. 5 ). A computing device may be, for example, a mobile phone, a tablet computer, a laptop computer, a desktop computer, a server, a distributed computing system, or a cloud resource. The computing device may include one or more processors, memory (e.g., random access memory), and persistent storage (e.g., disk drives, solid-state drives, etc.). The computing device may include instructions, stored on the persistent storage, that when executed by the processor(s) of the computing device, cause the computing device to perform the functionality of the production hosts (104)-(106) described throughout this application.

Alternatively, in one or more embodiments of the invention, the production hosts (104)-(106) may also be implemented as logical devices, as discussed above.

In one or more embodiments of the invention, the clients (130) may interact with the production hosts (104)-(106). For example, the clients (130) may utilize application services provided by the production hosts (104)-(106). When the clients (130) interact with the production hosts (104)-(106), data that is relevant to the clients (130) may be stored on the production hosts (104)-(106). For example, consider a scenario in which the production hosts (104)-(106) host a database utilized by the clients (130). In this scenario, the database may be a user database associated with the users of the clients (130). When a new user is identified, the clients (130) may add information regarding the new user to the database. By doing so, the data that is relevant to the clients (130) may be stored in the production hosts (104)-(106). This may be done because the clients (130) may desire access to the data regarding the new user at some point in time.

In one or more embodiments of the invention, the clients (130) may include functionality to use services provided by the production hosts (104)-(106). For example, the clients (130) may host local applications that interact with applications hosted by the production hosts (104)-(106).

In one or more embodiments of the invention, the clients (130) may be implemented as computing devices (e.g., 500, FIG. 5 ). A computing device may be, for example, a mobile phone, a tablet computer, a laptop computer, a desktop computer, a server, a distributed computing system, or a cloud resource. The computing device may include one or more processors, memory (e.g., random access memory), and persistent storage (e.g., disk drives, solid-state drives, etc.). The computing device may include instructions, stored on the persistent storage, that when executed by the processor(s) of the computing device, cause the computing device to perform the functionality of the clients (130) described throughout this application.

Alternatively, in one or more embodiments of the invention, the clients (130) may also be implemented as logical devices, as discussed above.

Turning now to FIG. 2 , FIG. 2 shows a diagram of specific components utilized in performing a backup of a target production host (200) in accordance with one or more embodiments of the invention. The target production host (200) communicates with an intelligent file system crawler (210) and with a backup storage device (220). Each component illustrated in FIG. 2 is discussed below.

The target production host (200) may be similar to the production hosts (104)-(106) as discussed above in reference to FIG. 1 . The production host (200) may include VMs, a hypervisor, a production agent, and storage devices (e.g., 204 and 206). The production host may include additional, fewer, and/or different components without departing from scope of the invention. Each component may be operably connected to any of the other component via any combination of wired and/or wireless connections.

As discussed above, the production host may provide computer implemented services to the client(s) (e.g., 130 in FIG. 1 ) and obtain backup storage services from the backup storage device (220). To provide and obtain the aforementioned computer implemented services and the backup storage services, the production host may include a backup agent (102), application(s) (112)-(114), and persistent storage (128). The production host may include other and/or additional components without departing from the invention.

The backup storage device (220) is the same or substantially similar to the backup storage device in FIG. 1 . The backup storage device (220) stores a backup created at least in part by the intelligent file system crawler (210), which crawls the data in the target production host (200).

Target production host (200) include storage devices, e.g., 204, 206. The storage devices include a file system meta-data repository (208A) and data (209A). A file system meta-data repository (208A) may be one or more data structures that include information regarding applications stored in the file system repository. The information included in the file system meta-data repository (208A) may be used by the backup agent to generate backups and historical meta-data. The file system meta-data repository (208A) may include other and/or additional information without departing from the invention.

The file system meta-data repository, e.g., 208A and 208B, may include one or more data structures that may be used to generate backups of assets of a target file system of a target production host. The file system meta-data repository e.g., 208A and 208B, may include asset data generated by users of the application(s) (112)-(114) as discussed above. The asset data may be any type of data such as database data and email data generated by users of the application(s) (112)-(114) without departing from the invention. Each application of the application(s) (112)-(114) may include any number of assets, each asset may include any quantity of asset data, and furthermore, each asset may include any number of elements without departing from the invention. Users (e.g., clients (130)) may use the data, e.g., 209A and 209B, stored on the storage devices, e.g., 204 and 206, when obtaining computer implemented services from the target production host (200). Additionally, the target data, e.g., 209A and 209B, stored on the storage devices, e.g., 204 and 206, of the target production host (200), may be obtained by intelligent file system crawler (210) to generate backups. The data e.g., 209A and 209B, of the file system meta-data storage devices, e.g., 204 and 206, may be used by other and/or additional entities for other and/or additional purposes without departing from the invention.

In one or more embodiments of the invention, the backup agents (e.g., 102 FIG. 1 ) include an intelligent file system crawler (210) to obtain backups (e.g., 222 and 224) including meta-data, e.g., 226A and 226B, data, e.g., 228A and 228B, and skipped files meta-data, e.g., 230A and 230B, from the target file system of the target production host (200). The meta-data, data, and skipped files meta-data are stored in the backup storage device (220). The intelligent file system crawler (210) may also include the functionality to provide backups (e.g., 222 and 224), meta-data, e.g., 226A and 226B, and skipped files meta-data, e.g., 230A and 230B, to the production host (200, FIG. 2 ) for restoration purposes, history monitoring purposes, and/or other and/or additional purposes without departing from the invention. The intelligent file system crawler (210) may include other and/or additional functionalities without departing from the invention. In another embodiment of the invention, the file system crawler may be located on the production host.

The meta-data, e.g., 226A and 226B, and skipped files meta-data e.g., 230A and 230B, of the backups e.g., 222 and 224, may be one or more data structures that include historical information associated with each backup e.g., 222 and 224, and aspects of the application(s) (112 and 114, FIG. 1 ). The historical information may include a list of files and folders that have been skipped during crawling of the storage devices (204) and (206). This list may be stored in the skipped files meta-data e.g., 230A and 230B. Alternatively other storage areas including the meta-data e.g., 226A and 226B, or file system meta-data, e.g., 208A and 208B, may be used to store the lists of skipped files.

The skipped files meta-data e.g., 230A and 230B, includes a complete chronological history of files and/or folders that have been skipped. For each file and/or folder that has been skipped, the historical information may include when it was previously successfully backed up along with reason for its not being backed up such as, e.g., access denied or inaccessible. The data can be stored in the form of a table. An exemplary table is shown below.

TABLE 1 Skipped Files Last Name Is Protected Backed up Reason F2 No Never Access denied N1 No Monday Inaccessible Feb. 7, 2022 N3 No Never User- Excluded

In the above Table, a file “F2” which has not been backed up, because access was denied. Further, a folder entry named “N1” was backed up on the February 7^(th) but not during the last backup because it has been inaccessible during backups since the February 7^(th). Further, a folder entry named “N3” has never been backed up as it was excluded from being backed up by the user. The invention is not limited to the aforementioned example. Further, the skipped file may include different and/or additional information without departing from the invention. Further, the skipped file may be organized in a different manner than shown in the above table without departing from the invention.

In one or more embodiments of the invention, the intelligent file system crawler (210) is a physical device. The physical device may include circuitry. The physical device may be, for example, a field-programmable gate array, application specific integrated circuit, programmable processor, microcontroller, digital signal processor, or other hardware processor. The physical device may be adapted to provide the functionality of the intelligent file system crawler (210) described throughout this application.

In one or more embodiments of the invention, the intelligent file system crawler (210) is implemented as computer instructions, e.g., computer code, stored on a persistent storage (220) that when executed by a backup agent (e.g., 102 of FIG. 1 ), causes a processor to provide the functionality of the intelligent file system crawler (210) described throughout this application.

In one or more embodiments of the invention, the backup storage device (220) stores data related to the backup. The data stored in backup storage device (220) may include backups of target data associated with applications of the target production host (200). The backup storage device (220) may store any quantity of backups without departing from the invention. The backup storage device (220) may store full backup (222) and incremental backup (224). The backup storage device (220) may store other and/or additional data without departing from the invention.

The backup storage device (220) may be implemented using physical storage devices and/or logical storage devices. The physical storage devices may include any combination of hard disk drives, solid state disk drives, tape drives, and/or any other physical storage mediums for the storage of data.

The logical storage devices (e.g., virtualized storage) may utilize any quantity of hardware storage resources of any number of computing devices for storing data. For example, the backup storage device (220) may utilize portions of any combination of hard disk drives, solid state disk drives, tape drives, and/or any other physical storage medium of any number of computing devices.

FIGS. 3 and 4 show a method to perform a backup in accordance with one or more embodiments of the invention. While the various steps in the method are presented and described sequentially, those skilled in the art will appreciate that some or all the steps may be executed in different orders, may be combined, or omitted, and some or all steps may be executed in a parallel manner without departing from the scope of the invention.

FIG. 3 shows a flowchart of a method of generating a backup in accordance with one or more embodiments of the invention. The method may be performed by, for example, a backup agent (102, FIG. 1 ) and/or intelligent file system crawler (210, FIG. 2 ) of a production host (104-106, FIG. 1 ). Other components of the system illustrated in FIG. 1 and FIG. 2 may perform all, or a portion of the method of FIG. 3 without departing from the invention.

While FIG. 3 is illustrated as a series of steps, any of the steps may be omitted, performed in a different order, additional steps may be included, and/or any or all the steps may be performed in a parallel and/or partially overlapping manner without departing from the invention.

In step 300, the system begins a backup on the target production host (200, FIG. 2 ).

In one or more embodiments of the invention, the backup is started based on a backup generation event that is identified by the backup agent as point in time specified by a backup policy associated with the generation of a backup of a target or obtaining a message from a client requesting the generation of a backup of the target. In one embodiment, the backup agent may include a backup policy associated with the target that specifies points in time to generate backups of the target file system. The backup agent may monitor the backup policy and identify when a point in time specified by the backup policy occurs. The backup policy may include an identifier associated with the target corresponding with the backup policy. The identification of the point in time specified by the backup policy may result in the identification of the backup generation event by the backup agent. In another embodiment of the invention, a user of a client may send a message to the backup agent. The message may include a request to generate a backup of the target. The message may include an identifier associated with the target. The backup agent may identify obtaining the aforementioned message as the backup generation event. The backup generation event initiating a backup of a target may be identified via other and/or additional methods without departing from the invention.

In step 302, the backup agent causes the intelligent file system crawler (210 FIG. 2 ) to begin crawling the target production host and its file system (target file system).

In one or more embodiments of the invention an intelligent file system crawler which as described above is implemented in the backup agent or as a standalone agent/system for analyzing the contents of the target host's file system. The intelligent file system crawler analyzes each folder to determine if the folder and/or files within it are to be backed-up according to the policy and rules that generated the backup event. The intelligent file system crawler also determines if there are rules or other reasons that the file or folder cannot be backed up, which will be described in more detail with regards to step 304. The intelligent file system crawler can take other forms without deviating from the scope of the disclosed invention.

The intelligent file system crawler can identify each file or folder and assign an identification to the file or folder for comparison. The identification in one or more embodiments can take the form of a hash value that is based on the file or folders characteristics. The hash value can be calculated using known method for calculating a hash value such as, but not limited to, MD4, MD5, SHA-1, SHA-2, and SHA-3. The identification in one or more other embodiments be related file/folder names, complete path of the file/folder, and/or any other useful means for identifying them.

Based on the identification or other characteristics of the file or folder can determine whether a file is to be backed-up or skipped. Other details of the files and/or folders can be determined which will be written to the backup's meta-data and/or a separate file such as the skipped files meta-data, which will be discussed in more detail with regards to steps 304 and 306.

In step 304, based on the crawling of the target production host, folders and files that will not be backed up are determined.

As discussed above the intelligent file system crawler can determine if a file or folder is to be skipped. This may be based on the file or folder being contained in an exclusion list or exclusion filter made by the user/administrator or by some other process which identifies files that should not be retained in the backup system. A non-limiting example is excluding a file type that would take up too much storage and/or would serve little purpose during a recovery.

Other files and/or folders may be skipped due to permissions or access restrictions. For example, a file may be included in an access-control list (ACL) and require a permission to be accessed that the backup lacks for security reasons. Other reasons including current file or folder usage may also prohibit a backup being able to be performed on a file or folder. Other reasons for skipping a file or folder may be determined and/or stored without departing from the invention. Once it is determined that a file or folder will be skipped the method goes to step 306.

In step 306, the details of the files and/or folders that are skipped are stored in a separate file such as, but not limited to, the skipped files meta-data file (e.g., 230A, FIG. 2 ). The skipped files and/or folders may be stored in the form of a table such as shown in table 1 above. Alternatively, the skipped files and/or folders may be stored in a database or other format appropriate to include information on the skipped files and/or folders.

In one or more embodiments of the invention the skipped files and/or folders are stored in a skipped file meta-data file (e.g., 230A, FIG. 2 ), this may be a separate file or part of the backup metadata (e.g., 226A, FIG. 2 ). The file may be stored on the backup storage device (e.g., 220, FIG. 2 ) or elsewhere such as on the target production hose (e.g., 200, FIG. 2 ) or a client (e.g., 130, FIG. 1 ).

In one or more embodiments of the invention, the saved details of the skipped files and/or folders include information that can be used to determine if the file has previously been skipped and the reasons that is was skipped. This information can be used to generate an alert to a user or administrator based on preset criteria as will be discussed later with regards to FIG. 4 . The saved details of the skipped files and folders can include, but is not limited to, such entries as hash values of the file path, last date of a successful backup, error codes, filter identifiers, non-inclusion reasons, the file or folders complete path, and other information that would be useful to the administrator or user requesting the backup to understand the protections that the backup is providing.

In step 308, the backup agent completes the backup up on the remaining files (those that were not skipped).

In one or more embodiments of the invention, the backup agent generates a backup, including meta-data associated with the backup, using the multiple change lists, and stores the backup and the historical meta-data in a backup storage of the backup storages. The backup can take the form of a full back up or an incremental backup. When performing the backup, the backup agent can use previous skipped files meta-data to determine files to try to include in the incremental backup. Other resources can be used for performing the backup such as backup meta-data and file system meta-data.

In step 310 then notifies the user or administrator information on the skipped files and/or folders. This can take place before, during, or after the backup is performed in step 308. If performed before, it would give the user/administrator the ability to change policies or settings on the backup to capture files and/or folders that were being skipped. If performed after the step may also include notifying the user/administrator that the backup has either completed successfully or as failed (along with any pertinent statics or explanations).

The notification can take any form that is useful to the user or administrator and is not limited to those described herein. The notification in step 310 can take the form of displaying a table similar to that of table 1 on a graphical user interface (GUI) of the client or other device's display. In other embodiments an alert would be provided on the GUI only when a condition is met as determined in the method of FIG. 4 .

The method may end following step 310.

FIG. 4 shows a flowchart of a method of crawling the target production host and identifying files that have been skipped and alerting a user when the skipped files meet a predetermined threshold. The method may be performed by, for example, a backup agent (102, FIG. 1 ) and/or intelligent file system crawler (210, FIG. 2 ) of a production host (104-106, FIG. 1 ). Other components of the system illustrated in FIG. 1 and FIG. 2 may perform all, or a portion of the method of FIG. 4 without departing from the invention.

The method of FIG. 4 can be performed during step 304 of FIG. 3 or can be performed as a stand-alone process. In other one or more embodiments the method of FIG. 4 can be performed during steps other than 304 of FIG. 3 . In one or more embodiments of the invention, the method of FIG. 4 is performed for each file/folder added to a skipped files meta-data (e.g., 230A or 230B of FIG. 2 ) or for every file/folder encountered by the intelligent file system crawler.

While FIG. 4 is illustrated as a series of steps, any of the steps may be omitted, performed in a different order, additional steps may be included, and/or any or all the steps may be performed in a parallel and/or partially overlapping manner without departing from the invention.

In step 400, the next file or folder that has not been backed up or is a skipped file is identified and considered according to the method of FIG. 4 . The meta-data or other information concerning this file or folder is then considered in step 402.

In step 402 the meta-data (or other pertinent information obtained by the intelligent file system crawler or equivalent thereof), is compared with at least two prior backups. For example, if the current backup process is backup N (see e.g., 128N of FIG. 1 ), the metadata of the skipped file (which would be in the skipped files meta-data e.g., 230B of FIG. 2 ) would be compared to at least a backup M's skipped files meta-data. The previous backup may be the full backup (e.g., 222 of FIG. 2 ) or one or more incremental backups (e.g., 224 of FIG. 2 ).

The comparison can take the form of comparing the past backup metadata to determine the last time the file was backed up and in step 404 it is determined if the file was backed up in a predetermined amount of time or alternatively in a predetermined number of backups. The predetermined amount of time or number of backups can be set by a user or administrator when configuring the backups, alternatively the predetermined amount of time or number of backups can be determined by a data manager or other part of the hosts or clients. The predetermined amount of time or number of backups can be set on a per-file type basis (as a non-limiting example, all databases have to be backed up every 7 days, while emails must be backed up at least once a day), or on a universal basis (as a non-limiting example all files must be backed up every 14 days).

If the amount of time since the last backup of the file or folder is greater than the predetermined amount of time (which may be set by a user) or number of backups, the method proceeds to step 410, where the user or administrator is alerted or notified that the file or folder is not being backed up. In one or more embodiments of the invention, this can take the form of a single statement on the user or administrator's display that a file/folder has not been backed up for a specific amount of time. In one or more other embodiments of the invention, all files/folders that have not been backed up for the specific amount of time are displayed in the form of a chart which includes such information as when the last backup did occur (if ever) and any other information that the user or client deems is necessary.

Once the user or administrator is alerted in step 410, the method proceeds to step 406 and the next file that has not been backed up is identified.

While the alerting is described as occurring each a time a determination is made, the alerting may only occur after all of the files have been processed. In this manner, the user and/or administrator is not inundated with multiple alerts; rather, the user is only alerted once (or relatively few times).

Either following step 410 or 404, in step 406 the information regarding the skipped file or folder is saved to a file such as a skipped files meta-data (e.g., 230 of FIG. 2 ). Saving the information is discussed in more detail with the regards to step 306 in the method of FIG. 3 . In one or more other embodiments of the invention, the saving of step 406 can be done in alternative files besides those described in regards to the method of FIG. 3 . In yet another one more embodiment of the invention, the details of the files can be presented to a user or administrator.

Once the details of the file are saved or presented to a user or administrator in accordance with step 406, the method proceeds to step 408. In step 408 it is determined if all files that have not been backed up and/or skipped have been compared. If all files that have not been backed up and/or skipped have been compared then the method ends, otherwise the next file or folder is identified in step 400 and the method continues until in step 408 it is determined that all files and folders have been compared.

The method shown in FIG. 3 is used to identify gaps in data protection while the method shown in FIG. 4 may be further used to identify when specific files have not been backed up for an extended period of time. Said another way, FIG. 3 generates a list of what has not been backed up and why, while FIG. 4 further highlights skipped files that are outside a threshold range.

Additionally, as discussed above, embodiments of the invention may be implemented using computing devices. FIG. 5 shows a diagram of a computing device in accordance with one or more embodiments of the invention. The computing device (500) may include one or more computer processors (502), non-persistent storage (504) (e.g., volatile memory, such as random access memory (RAM), cache memory), persistent storage (506) (e.g., a hard disk, an optical drive such as a compact disk (CD) drive or digital versatile disk (DVD) drive, a flash memory, etc.), a communication interface (512) (e.g., Bluetooth interface, infrared interface, network interface, optical interface, etc.), input devices (510), output devices (508), and numerous other elements (not shown) and functionalities. Each of these components is described below.

In one embodiment of the invention, the computer processor(s) (502) may be an integrated circuit for processing instructions. For example, the computer processor(s) may be one or more cores or micro-cores of a processor. The computing device (500) may also include one or more input devices (510), such as a touchscreen, keyboard, mouse, microphone, touchpad, electronic pen, or any other type of input device. Further, the communication interface (512) may include an integrated circuit for connecting the computing device (500) to a network (not shown) (e.g., a local area network (LAN), a wide area network (WAN) such as the Internet, mobile network, or any other type of network) and/or to another device, such as another computing device.

In one embodiment of the invention, the computing device (500) may include one or more output devices (508), such as a screen (e.g., a liquid crystal display (LCD), a plasma display, touchscreen, cathode ray tube (CRT) monitor, projector, or other display device), a printer, external storage, or any other output device. One or more of the output devices may be the same or different from the input device(s). The input and output device(s) may be locally or remotely connected to the computer processor(s) (502), non-persistent storage (504), and persistent storage (506). Many distinct types of computing devices exist, and the input and output device(s) may take other forms.

One or more embodiments of the invention may be implemented using instructions executed by one or more processors of the data management device. Further, such instructions may correspond to computer readable instructions that are stored on one or more non-transitory computer readable mediums.

Turning now to FIG. 6 , FIG. 6 shows a flowchart of a method in accordance with one or more embodiments of the invention. The method depicted in FIG. 6 may be performed to generate a graphical user interface (GUI) showing a protection status of each file/folder/data of a target file system that was backed up using the process discussed above in reference to FIG. 3 . The method shown in FIG. 6 may be performed by any combination of the devices (e.g., the intelligent file system crawler (210) of the backup agents (102), any of the clients (130), etc.) of shown in FIGS. 1 and 2 .

While FIG. 6 is illustrated as a series of steps, any of the steps may be omitted, performed in a different order, additional steps may be included, and/or any or all of the steps may be performed in a parallel and/or partially overlapping manner without departing from the invention. Additionally, steps in FIG. 6 shown using broken lines may be optional steps within the method.

Initially, in Step 600, a file system backup metadata associated with a target file system is obtained. In one or more embodiments, the target file system may be the same target file system discussed above in Step 302 of FIG. 3 . Additionally, the file system backup metadata may include, but is not limited to: the skipped file meta-data file (e.g., 230A, FIG. 2 ); and the backup metadata (e.g., 226A, FIG. 2 ).

In Step 602, the file system backup metadata is processed to obtain backup information of the target file system. In one or more embodiments, the backup information of the target file systems may include, for example, but is not limited to: information specifying each file/folder/data in the target file system as protected data (e.g., successfully backed up data) or unprotected data (e.g., data that are not yet (or failed to be) backed up); and protection failure information associated with the unprotected data. In one or more embodiments, the protection failure information may specify one or more reasons why a certain file/folder/data is not backed up. Examples of the protection failure information is shown above in Table 1 as information specified in the “Reason” column.

In Step 604, a backup history dataset is generated for the target file system. In one or more embodiments, the backup history dataset may be generated using information included in the file system backup metadata. If more than one file system backup metadata exists for the target file system (e.g., in the event that the target file system has been backed up more than once), all of the system backup metadata associated with the target file system may be used to generate the backup history dataset. Additionally, the backup history dataset may be updated in real-time to obtain an updated backup history dataset when the system determines that a new file system backup metadata is generated (or that the existing file system backup metadata is updated) based on another backup being executed on the target file system after the previous backup history dataset has been generated

In one or more embodiments, using the information from the file system backup metadata(s), the backup history dataset may specify information such as, but is not limited to: when each of the protected data in the target file system was last backed up; and how long each of the unprotected data in the target file system has not been backed up.

In Step 606, a protection status is generated for each data (e.g., file/folder/data) stored in the target file system. In one or more embodiments, the protection status may be generated using the backup information and the backup history dataset. The protection status may also be generated using general information of the target file system. In one or more embodiments, the general information of the target file system may include general details (e.g., a name, a path, a creation date, a size, a file/folder/data hierarchy, etc.) of one or more data (e.g., files/folders/data) stored in the target file system.

In one or more embodiments, the protection status may indicate whether each data (e.g., files/folders/data) stored in the target file system is fully or partially protected. For example, assume that the target file system includes a folder A including file A (that may be stored in a sub-folder of folder A) and file B (that may be stored directly in folder A next to the sub-folder). Further assume that file A is protected and file B is unprotected. The protection status of folder A may be shown as either one of “unprotected (partial)” or “protected (partial)”. This is shown in more detail below in reference to FIG. 7 .

In one or more embodiments, the protection status may also include all of the information specified by the backup history dataset and/or the updated backup history dataset. More specifically, the protected status may show (on the GUI) when each of the protected data in the target file system was last backed up and how long each of the unprotected data in the target file system has not been backed up.

In Step 608, a graphical user interface (GUI) is generated to show all of the data stored in the target file system and the protection status of each of these data stored in the target file system. In one or more embodiments, the GUI may be generated using any combination of the processed and/or generated information/data discussed above in Steps 602 to 606 of FIG. 6 .

In one or more embodiments, the protection failure information associated with each data (e.g., file/folder/data) of the target file system may also be presented on the GUI. In one or more embodiments, while generating the GUI, the protection failure information may be used to generate one or more recommendations for addressing each of the unprotected data. These recommendations may also be included in the GUI along with the protection failure information.

In Step 610, the GUI is displayed to a user on a display of the user's computing device (e.g., an edge device; the client 130 of FIG. 1 ). More specifically, in one or more embodiments, the backup agents (e.g., 102, FIG. 1 ) in which the intelligent file system crawler is included may transmit instructions to the user's computing device to instruct the user's computing device to display the GUI on a display. This advantageously allows users (whose computing devices are on the edge of the network on which the backup system (e.g., system 100, FIG. 1 ) is instantiated) to obtain a more detailed and real-time understanding of how their data (e.g., files/folder/data) is being protected by the backup system.

In one or more embodiments, using the information presented on the GUI, the user may execute one or more types of on-demand protection on the data (e.g., files/folder/data) stored in the target file system. For example, the user may select a specific data on the GUI with an unprotected protection status and initiate a real-time backup of that specific data. As another example, the user may transmit a backup request to the backup agent to backup any of the data on the GUI marked as unprotected. The backup request may also include certain conditions such as, but is not limited to: only back up unprotected data that has not been backed up for the last n number of days where n is a whole non-negative integer; only back up unprotected data in a certain folder or sub-folder; etc. Any data meeting these conditions specified in the backup request will be backed up in real time.

As yet another example, the user may use the information shown on the GUI to set backup policies that are centered around the information specified in the backup history dataset. For example, the backup policy may specify conditions such as, but are not limited to: at the end of each month, back up all data that are marked as unprotected (regardless of whether the data is fully or partially unprotected); at the middle of each month, back up all unprotected data (fully or partial) that have not been backed up in the last n number of days; etc. Any data meeting these conditions specified in these backup policies will be backed up in real time.

In one or more embodiments, each of the above-discussed real-time backup of the unprotected data of the target file system may be an attempt to back up the unprotected data. More specifically, any of the above-discussed real-time backup may fail because of one or more limitations associated with each of the unprotected data. For example, as discussed above, back up of a file or folder may fail because the user does not have permission to access the file or folder. If the user still does not have access to the file or folder when the real-time backup is initiated, the real-time backup will fail again. If the real-time backup fails, the reason for back up failure will be determined and stored as new (or updated) file system backup metadata, which will be used to update the previously generated backup history dataset. Similar to the backup process discussed above in reference to FIG. 3 , other details of the real-time backup may also be stored in the new (or updated) file system backup metadata generated after the real-time backup has been executed.

FIG. 7 shows an implementation example in accordance with one or more embodiments. More specifically, FIG. 7 shows an example GUI generated in above-discussed Step 606 of FIG. 6 . One of ordinary skill in the art would appreciate that the GUI should not be limited to the format shown in FIG. 7 , and that the GUI may be shown in any format/form without departing from the scope of one or more embodiments disclosed herein.

BEGINNING OF EXAMPLE

As shown in FIG. 7 , a GUI (700) is generated for the target file system. The GUI (700) shows that the target file system includes a plurality of folders. Each of the folders is provided with information showing whether it is protected (e.g., via the “Protection Status” column where “Yes” indicates that the folder is fully protected and “No” indicates that the folder is fully or partially unprotected) and how long each folder has not been protected for (e.g., via the “Not Protected for:” column). In one or more embodiments, the “Protection Status” column and the “Not Protected for:” column may be merged into a single “Protection Status” column.

As shown in the GUI (700) of FIG. 7 , there are three folders (“Microsoft”, “Program Files” and “Users”) that are unprotected. This indicates to a user that backup of these folders have previously failed. The user may then browse through the GUI to find protection failure information (not shown) specifying why the previous attempt(s) to back up these folders has failed.

The users may also use the information specified in the “Not Protected for:” to generate one or more backup requests and/or backup policies to backup certain folders that have not been backed up for an n number of days (e.g., 7 days). Finally, the user may also click on any of the unprotected folders to see the exact data (e.g., files and/or sub-folders) within these folders that are unprotected.

END OF EXAMPLE

One or more embodiments of the invention may improve the operation of one or more computing devices. More specifically, embodiments of the invention relate to generating backups of applications. The user or administrator that monitors the backup is notified of those files and/or folders that have not been backed up in the most recent backup. Further, embodiments of the invention enable alerts to be initiated when a particular file or folder has not been backed up over multiple backups or over a predetermined period. As a result, the user or administrator can have a better understanding of the protection and lack of protection that the present backups are providing.

Thus, embodiments of the invention may address the problem of skipped files and folders when performing a backup. This problem arises due to the technological nature of the specific applications that are being backed up.

The problems discussed above should be understood as being examples of problems solved by embodiments of the invention disclosed herein and the invention should not be limited to solving the same/similar problems. The disclosed invention is broadly applicable to address a range of problems beyond those discussed herein.

While the invention has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments can be devised which do not depart from the scope of the technology as disclosed herein. Accordingly, the scope of the invention should be limited only by the attached claims. 

What is claimed is:
 1. A method for performing a backup, the method comprising: obtaining a file system backup metadata associated with a target file system of a target production host; processing the file system backup metadata to determine protected data and unprotected data in the target file system; after processing the file system backup metadata, using the file system backup metadata to generate a backup history dataset for the target file system, wherein the backup history dataset comprises backup history information specifying: when each of the protected data in the target file system was last backed up, and how long each of the unprotected data in the target file system has not been backed up; generating a protection status for each data in the target file system based on the backup history dataset and the determined protected data and unprotected data of the target file system; generating a graphical user interface (GUI) for the target file system showing the data of the target file system along with the protection status of each of the data of the target file system; and displaying, on a display of a computing device and to a user, the GUI.
 2. The method of claim 1, further comprising: before obtaining the file system backup metadata: crawling the target file system of the target production host; identifying, based on the crawling, files that will not be backed up; storing details of the files that will not be backed up to a separate file, wherein the separate file is the file system backup metadata; notifying, using the separate file, the user of the files that will not be backed up; and performing the backup of remaining files, wherein the remaining files are not listed in the separate file.
 3. The method of claim 2, wherein the target file system comprises a folder comprising a first subfolder and as second subfolder, wherein the protection status is generated for each of the folder, the first subfolder, and the second subfolder, and wherein the GUI comprises the folder, the first subfolder, the second subfolder, and the protection statuses of each of the folder, the first subfolder, and the second subfolder.
 4. The method of claim 2, wherein the file system backup metadata is generated in response to a first backup process being initiated for the target file system, and wherein the method further comprises: obtaining a second file system backup metadata generated in response to a second backup process being initiated for the initiated for the target file system, wherein the second backup process is initiated after the first backup process is completed; processing both the first file system backup metadata and the second file system backup metadata to determine the protected data and the unprotected data in the target file system; after processing both the first file system backup metadata and the second file system backup metadata, updating the backup history dataset using both the first file system backup metadata and the second file system backup metadata to obtained to obtain an updated backup history dataset for the target file system; generating an updated protection status for each of the data in the target file system based on the updated backup history dataset and the determined protected data and unprotected data of the target file system; generating an updated one of the graphical user interface (GUI) for the target file system showing the data of the target file system along with the updated protection status of each of the data of the target file system; and displaying, on the display of the computing device and to the user, the updated GUI.
 5. The method of claim 1, wherein the method further comprises, after generating the backup history dataset for the target file system: making a first determination that the target file system is associated with a pre-stored backup policy specifying backup conditions; determining, using the backup history information the backup history dataset, that a first unprotected data among the unprotected data meets at least one of the backup conditions; and based on the determination, back up the first unprotected data and display a backup result of the backing up of the first unprotected data to the user on the GUI.
 6. The method of claim 1, wherein the method further comprises, after generating the backup history dataset for the target file system: receiving a backup request specifying a backup condition; determining, using the backup history information of the backup history dataset, that a first unprotected data among the unprotected data meets the backup condition; and based on the determination, attempt to back up the first unprotected data and display a backup result of the attempt to the user on the GUI.
 7. The method of claim 6, wherein the backup result is displayed as the protected status, and wherein in the event that the attempt has failed, the backup result comprises protection failure information specifying why the attempt to back up the first unprotected data failed.
 8. A non-transitory computer readable medium (CRM) comprising computer readable program code, which when executed by a computer processor enables the computer processor to perform a method for performing a backup, the method comprising: obtaining a file system backup metadata associated with a target file system of a target production host; processing the file system backup metadata to determine protected data and unprotected data in the target file system; after processing the file system backup metadata, using the file system backup metadata to generate a backup history dataset for the target file system, wherein the backup history dataset comprises backup history information specifying: when each of the protected data in the target file system was last backed up, and how long each of the unprotected data in the target file system has not been backed up; generating a protection status for each data in the target file system based on the backup history dataset and the determined protected data and unprotected data of the target file system; generating a graphical user interface (GUI) for the target file system showing the data of the target file system along with the protection status of each of the data of the target file system; and displaying, on a display of a computing device and to a user, the GUI.
 9. The CRM of claim 8, wherein the method further comprises: before obtaining the file system backup metadata: crawling the target file system of the target production host; identifying, based on the crawling, files that will not be backed up; storing details of the files that will not be backed up to a separate file, wherein the separate file is the file system backup metadata; notifying, using the separate file, the user of the files that will not be backed up; and performing the backup of remaining files, wherein the remaining files are not listed in the separate file.
 10. The CRM of claim 9, wherein the target file system comprises a folder comprising a first subfolder and as second subfolder, wherein the protection status is generated for each of the folder, the first subfolder, and the second subfolder, and wherein the GUI comprises the folder, the first subfolder, the second subfolder, and the protection statuses of each of the folder, the first subfolder, and the second subfolder.
 11. The CRM of claim 9, wherein the file system backup metadata is generated in response to a first backup process being initiated for the target file system, and wherein the method further comprises: obtaining a second file system backup metadata generated in response to a second backup process being initiated for the initiated for the target file system, wherein the second backup process is initiated after the first backup process is completed; processing both the first file system backup metadata and the second file system backup metadata to determine the protected data and the unprotected data in the target file system; after processing both the first file system backup metadata and the second file system backup metadata, updating the backup history dataset using both the first file system backup metadata and the second file system backup metadata to obtained to obtain an updated backup history dataset for the target file system; generating an updated protection status for each of the data in the target file system based on the updated backup history dataset and the determined protected data and unprotected data of the target file system; generating an updated one of the graphical user interface (GUI) for the target file system showing the data of the target file system along with the updated protection status of each of the data of the target file system; and displaying, on the display of the computing device and to the user, the updated GUI.
 12. The CRM of claim 8, wherein the method further comprises, after generating the backup history dataset for the target file system: making a first determination that the target file system is associated with a pre-stored backup policy specifying backup conditions; determining, using the backup history information the backup history dataset, that a first unprotected data among the unprotected data meets at least one of the backup conditions; and based on the determination, back up the first unprotected data and display a backup result of the backing up of the first unprotected data to the user on the GUI.
 13. The CRM of claim 8, wherein the method further comprises, after generating the backup history dataset for the target file system: receiving a backup request specifying a backup condition; determining, using the backup history information of the backup history dataset, that a first unprotected data among the unprotected data meets the backup condition; and based on the determination, attempt to back up the first unprotected data and display a backup result of the attempt to the user on the GUI.
 14. The CRM of claim 13, wherein the backup result is displayed as the protected status, and wherein in the event that the attempt has failed, the backup result comprises protection failure information specifying why the attempt to back up the first unprotected data failed.
 15. A system comprising: a memory; and a processor coupled to the memory, wherein the processor is configured to execute a method for performing a backup comprising: obtaining a file system backup metadata associated with a target file system of a target production host; processing the file system backup metadata to determine protected data and unprotected data in the target file system; after processing the file system backup metadata, using the file system backup metadata to generate a backup history dataset for the target file system, wherein the backup history dataset comprises backup history information specifying: when each of the protected data in the target file system was last backed up, and how long each of the unprotected data in the target file system has not been backed up; generating a protection status for each data in the target file system based on the backup history dataset and the determined protected data and unprotected data of the target file system; generating a graphical user interface (GUI) for the target file system showing the data of the target file system along with the protection status of each of the data of the target file system; and displaying, on a display of a computing device and to a user, the GUI.
 16. The system of claim 15, the method executed by the processor further comprises: before obtaining the file system backup metadata: crawling the target file system of the target production host; identifying, based on the crawling, files that will not be backed up; storing details of the files that will not be backed up to a separate file, wherein the separate file is the file system backup metadata; notifying, using the separate file, the user of the files that will not be backed up; and performing the backup of remaining files, wherein the remaining files are not listed in the separate file.
 17. The system of claim 16, wherein the target file system comprises a folder comprising a first subfolder and as second subfolder, wherein the protection status is generated for each of the folder, the first subfolder, and the second subfolder, and wherein the GUI comprises the folder, the first subfolder, the second subfolder, and the protection statuses of each of the folder, the first subfolder, and the second subfolder.
 18. The system of claim 16, wherein the file system backup metadata is generated in response to a first backup process being initiated for the target file system, and wherein the method further comprises: obtaining a second file system backup metadata generated in response to a second backup process being initiated for the initiated for the target file system, wherein the second backup process is initiated after the first backup process is completed; processing both the first file system backup metadata and the second file system backup metadata to determine the protected data and the unprotected data in the target file system; after processing both the first file system backup metadata and the second file system backup metadata, updating the backup history dataset using both the first file system backup metadata and the second file system backup metadata to obtained to obtain an updated backup history dataset for the target file system; generating an updated protection status for each of the data in the target file system based on the updated backup history dataset and the determined protected data and unprotected data of the target file system; generating an updated one of the graphical user interface (GUI) for the target file system showing the data of the target file system along with the updated protection status of each of the data of the target file system; and displaying, on the display of the computing device and to the user, the updated GUI.
 19. The system of claim 15, wherein the method further comprises, after generating the backup history dataset for the target file system: making a first determination that the target file system is associated with a pre-stored backup policy specifying backup conditions; determining, using the backup history information the backup history dataset, that a first unprotected data among the unprotected data meets at least one of the backup conditions; and based on the determination, back up the first unprotected data and display a backup result of the backing up of the first unprotected data to the user on the GUI.
 20. The system of claim 15, wherein the method further comprises, after generating the backup history dataset for the target file system: receiving a backup request specifying a backup condition; determining, using the backup history information of the backup history dataset, that a first unprotected data among the unprotected data meets the backup condition; and based on the determination, attempt to back up the first unprotected data and display a backup result of the attempt to the user on the GUI. 