Data loss vulnerability detection

An information management system can detect instances in which data is being stored in a non-standard file path and can alert the user of the client computing device, modify the storage policy to include the non-standard file path, and/or initiate a secondary copy operation to prevent data loss of t...

Full description

Saved in:
Bibliographic Details
Main Authors Bhagi, Sri Karthik, Bedhapudi, PurnaChandra Sekhar
Format Patent
LanguageEnglish
Published 22.10.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:An information management system can detect instances in which data is being stored in a non-standard file path and can alert the user of the client computing device, modify the storage policy to include the non-standard file path, and/or initiate a secondary copy operation to prevent data loss of the data stored in the non-standard file path. For example, a client computing device may execute a filter driver that monitors interactions with files in the file system. The filter driver can identify any non-standard file paths not subject to a storage policy that include files in which interactions occurred. For a non-standard file path, the filter driver can determine whether the frequency of interaction with files in the non-standard file path satisfies a threshold frequency. If the threshold is satisfied, then the filter driver may determine that the files should be subject to the storage policy and take appropriate action.
Bibliography:Application Number: US202318132915