One example method includes generating a policy recommendation that can be implemented in data protection systems. The generation of the policy is based on information garnered from multiple distinct users. Initially, the users are clustered based on their user profiles. The virtual machines operated by these users are then clustered based on virtual machine profiles. This allows, for each resulting cluster, policy recommendations to be made based on a policy distribution of the corresponding cluster.