EDR Exception Request

Endpoint Detection and Response software is required on all computers and servers (referred to as endpoints) owned by UC Berkeley and used for university work per the UC President’s Directive on Cybersecurity. If you have a business need that prevents you from installing EDR on your endpoint, you may request a one-year exception from this requirement. Exceptions will be reviewed by the Information Security Office. Exceptions will only be granted under very specific circumstances and not based on individual preference. 

Exceptions may be granted in cases included but not limiting to:

  • The endpoint does not meet the minimum hardware or software requirements for UC EDR software

  • EDR software would prevent the endpoint from adequately performing its intended function

  • There are legal or contractual obligations that would conflict with the use of EDR software

Before you submit your exception request:

  • Get your request approved by your departmental IS-3 Unit Head

    • You may need to reach out to your manager or departmental security lead for assistance getting approval from your IS-3 Unit Head.

  • Once approval is obtained, fill out the Information Security Policy Exception Form for Resource Proprietors and Service Providers and provide your IS-3 Unit Head’s, email address, title and department in the form section titled “Functional Owner(s) or Person(s) responsible for the data/business function impacted by the exception.” 

  • Gather the following information for the endpoint(s) you are requesting an exception for:

    • IP address

    • Hostnames

    • MAC addresses

  • Be prepared to provide information on the data contained on your endpoint(s), why you are requesting an exception, and how you will mitigate security risks that this policy would otherwise address.


All requests for exception must be submitted via the Information Security Policy Exception Form for Resource Proprietors and Service Providers