EDR Exception Request

Endpoint Detection and Response software is required on all university-owned computers and servers (referred to as endpoints) per the UC President’s Information Security Investment Plan. If you have a business need that prevents you from installing EDR on your endpoint, you may request a one-year exception from this requirement. Exceptions will be reviewed by the Information Security Office and only granted under very specific circumstances and not based on individual preference. 

Exceptions may be granted in cases including but not limited to:

  • The endpoint does not meet the minimum hardware or software requirements for UC EDR software.
  • EDR software would prevent the endpoint from adequately performing its intended function.
  • There are legal or contractual obligations that would conflict with the use of EDR software.

Before you submit your exception request:

  • Gather the following information for the endpoint(s) you are requesting an exception for:
    • IP address
    • Hostnames
    • MAC addresses
  • Be prepared to provide information on the data contained on your endpoint(s), why you are requesting an exception, and how you will mitigate security risks that this policy would otherwise address.

All exception requests must be submitted via the Information Security Policy Exception Form for Resource Proprietors and Service Providers