Endpoint Detection and Response software is required on all university-owned computers and servers (referred to as endpoints) per the UC President’s Information Security Investment Plan. If you have a business need that prevents you from installing EDR on your endpoint, you may request a one-year exception from this requirement. Exceptions will be reviewed by the Information Security Office and only granted under very specific circumstances and not based on individual preference.
Exceptions may be granted in cases including but not limited to:
- The endpoint does not meet the minimum hardware or software requirements for UC EDR software.
- EDR software would prevent the endpoint from adequately performing its intended function.
- There are legal or contractual obligations that would conflict with the use of EDR software.
Before you submit your exception request:
- Get your request approved by your departmental IS-3 Unit Head
- You may need to contact your manager or departmental security lead for assistance in getting approval from your IS-3 Unit Head.
- Once approval is obtained, fill out the Information Security Policy Exception Form for Resource Proprietors and Service Providers and provide the contact information for your IS-3 Unit Head in the form section titled “Functional Owner(s) or Person(s) responsible for the data/business function impacted by the exception.”
- Gather the following information for the endpoint(s) you are requesting an exception for:
- IP address
- Hostnames
- MAC addresses
- Be prepared to provide information on the data contained on your endpoint(s), why you are requesting an exception, and how you will mitigate security risks that this policy would otherwise address.
All exception requests must be submitted via the Information Security Policy Exception Form for Resource Proprietors and Service Providers