FAQ Berkeley Security Software

A knowledge base article about FAQ Berkeley Security Software provided by the UC Berkeley IT Service Hub - Knowledge Portal

Is the Berkeley Security Software the same thing as the Berkeley Desktop?

No, the Berkeley Desktop is a service IT Client Services offers to manage computers and improve user experience. It ensures UC Berkeley staff and affiliates can access important tools and data easily. The Berkeley Desktop uses BigFix to accomplish some of this.

The Berkeley Security Software combines BigFix, which provides asset identification and manages vulnerabilities, and Endpoint Detection and Response Software (EDR) to provide faster security response during malicious activity. BigFix (also used by the Berkeley Desktop) installs EDR on computers that are not campus-managed (i.e., managed by departmental IT or the individual user).

What types of devices work with the Berkeley Security Software?

What types of devices DO NOT work with the Berkeley Security Software?

How will the campus ensure Berkeley Security Software is installed on university machines?

We are exploring compliance enforcement measures that will likely involve restricting access to specific applications on devices that meet our cybersecurity standards, including the installation of Berkeley Security Software. Our goal is to roll this out gradually, providing campus departments with sufficient time to budget for the necessary hardware purchases to support compliance.

How long does it take to install Berkeley Security Software?

Timing will vary based on the operating system and age/type of hardware. If you have concerns about timing and performance, you should run the installer at the end of the day when you aren’t actively using your system.

How can I get help with installing Berkeley Security Software, or if I have questions?

For help with Installer Support, contact ITCS

Will the Berkeley Security Software slow down my computer or impact its performance?

The security software will not noticeably reduce your computer's overall speed or responsiveness. 

Can I request an exception for installing the Berkeley Security Software?

Most campus users are required to use the software. However, we have an exception process for the EDR portion of the software. Review the exception requirements for EDR and process before requesting an exception

Can I install the Berkeley Security Software on my personally owned computer?

No! This software is ONLY for university-owned computers and servers doing University business. This software is designed for businesses and may cause issues on your personal devices. Plus, personally owned computers and servers are unsuitable for handling sensitive institutional information. Our EDR software monitors extensive system activity to identify network threats. This can lead to unwanted monitoring of your files, apps, and activities on your computer. Good antivirus programs protect most personal computers well, so you usually don’t need EDR software for personal use. 

How are you ensuring my privacy rights with this Berkeley Security Software?

Berkeley prioritizes privacy and data protection for individuals with Endpoint Detection and Response (EDR) software installed on university-owned computers and servers. The Campus Privacy Office and the Information Risk Governance Committee (IRGC) are reviewing our EDR program. The IRGC provides governance over IT monitoring activities under campus and systemwide privacy policies, including the Electronic Communications Policy

Additionally, we:

See our detailed Privacy and Process Documentation for more information.

Has the UC Office of the President hosted any information sessions on this?

Yes, UCOP hosted a Town hall on this topic. You can reference the Internal Use Only recording