🚨 CMMC Phase One started November 10! Here's everything you need to know →

30-Day Roadmap to Apply Malware Protections at Appropriate Locations — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII

A practical 30-day roadmap to implement malware protections at appropriate locations to meet FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIII requirements for small businesses.

April 08, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This 30-day roadmap breaks the compliance requirement "apply malware protections at appropriate locations" (FAR 52.204-21 / CMMC 2.0 Level 1 - SI.L1-B.1.XIII) into practical, prioritized tasks you can execute this month to reduce risk and produce the documentation you need for self-attestation or audit evidence.

Key objectives and scope

The primary objectives are: identify where malware protections are needed (endpoints, servers, email, web gateways, removable media, cloud workloads), deploy appropriate protections tuned for those locations, and document settings and verification evidence for your Compliance Framework practice. Scope should include any systems that process, store, or transmit covered contractor information or Controlled Unclassified Information (CUI) per FAR guidance, plus administrative workstations and remote users.

30-day implementation roadmap (week-by-week)

Week 1 — Assess, scope, and prioritize

Days 1–7: inventory your environment (use asset discovery tools or manual lists). Identify operating systems, internet-facing services, email gateways, file servers, cloud workloads (e.g., Microsoft 365, AWS, Azure) and remote endpoints. Create a simple map showing where malware protections must be applied: endpoints, domain-joined servers, email gateway, web proxy, VPN concentrators, and removable media endpoints. Record existing protections (AV/EPP, mail filters, web filters, network IPS) and any gaps. Deliverable: a one-page scope summary and prioritized list of systems to protect.

Week 2 — Deploy endpoint and server protections

Days 8–14: choose or enable endpoint protection on all Windows, macOS, and Linux endpoints. For small businesses, cost-effective, managed options include Microsoft Defender for Business (or Defender for Endpoint if available), commercial EDR like CrowdStrike/SentinelOne, or reputable EPP with real-time scanning and behavioral detection. Configure: real-time protection enabled, automatic updates for signatures and engine, tamper protection, scheduled weekly full scans, cloud-delivered protection, and disable legacy SMBv1 where possible. On servers, enable server-focused agents, enable exploit mitigation rules (block scripting from user dirs, block Office macros from internet files), and ensure service accounts use least privilege. Use PowerShell to verify Defender status (Get-MpComputerStatus) and capture screenshots/log exports as evidence.

Week 3 — Secure email, web, and network ingress points

Days 15–21: apply malware protections at network egress and ingress: enable email scanning (SMTP/Exchange online protection) with attachment sandboxing and URL detonation, configure web proxies or secure web gateways to block known-malicious domains and enable HTTPS inspection where feasible, and implement DNS filtering (e.g., via a managed DNS security service) to block known-bad domains. If you have a firewall/UTM, enable IDS/IPS signatures for malware, and create rules to segment sensitive servers from general user networks. For remote workers, require VPN split-tunnel minimization and ensure VPN endpoints route traffic through company web filtering where possible.

Week 4 — Validation, documentation, processes, and training

Days 22–30: verify protections are working — run on-demand malware scans, send safe test attachments (EICAR) through email to verify scanning, and check logs from endpoints, mail gateways, and web filters. Document baseline configurations (versions, settings, schedules), create a short runbook for incident detection and initial response, and record retention policies for logs (recommend keeping EDR/AV telemetry and gateway logs for at least 30–90 days). Provide a 30-minute awareness session for staff on phishing hygiene and removable-media handling. Deliverables: configuration screenshots, scan/sandbox test results, short runbook, and staff attendance list.

Practical technical details and implementation notes

Apply specific technical controls: enable cloud-delivered protection and automatic sample submission; turn on behavior-based/heuristic detection; enable exploit protection / Attack Surface Reduction (ASR) rules (e.g., block Office from creating child processes, block credential stealing JS); implement application allowlisting (AppLocker or Microsoft Defender Application Control) where practical; and use YARA rules or custom indicators in your EDR for targeted threats. Forward antivirus and EDR alerts to a simple SIEM or central log collector (Syslog, Azure Sentinel, Splunk Light). Tune false positives for two weeks and document tuning changes. For removable media, use group policy to disable autorun and enforce scanning on mount.

Small-business scenario — concrete example

Example: Acme Engineering (25 employees) uses Microsoft 365 and a small Windows server for file shares. In day 1 they inventory 25 laptops, one server, and 3 cloud apps. Week 2 they enable Microsoft Defender for Business on all endpoints, configure tamper protection and ASR rules via Intune, and set a weekly full-scan schedule. Week 3 they activate Exchange Online Protection with Safe Attachments (detonation), enable a cloud-based web filter, and restrict file server access with network segmentation and ACLs. Week 4 they run EICAR tests, collect Defender health reports as evidence, document settings in their Compliance Framework evidence pack, and deliver a phishing training refresher to staff. This sequence covers SI.L1-B.1.XIII and the safeguarding expectations in FAR 52.204-21 while remaining affordable and achievable in 30 days.

Risks of non-implementation

Failure to apply malware protections at the right locations exposes your organization to ransomware, data exfiltration, supply-chain compromise, and loss of federal contracts. For contractors, non-compliance risks include contract penalties, inability to bid on future work, reputational damage, and potential reporting obligations if CUI is exposed. Technically, lacking protections at email or web gateways significantly increases phishing/ransomware success rates; missing endpoint EDR leaves lateral movement undetected.

Compliance tips and best practices

Keep evidence simple and verifiable: screenshots of configured policies, dated export of AV/EDR health checks, email/sandbox test results, and a short signed statement of scope and controls applied. Adopt least privilege and patch management in parallel — malware protections are most effective when endpoints are patched and users are non-admins. Automate updates and monitoring where possible; use managed services if you lack internal staff. Review controls monthly for tuning and retain logs for your chosen retention period. Finally, embed this control into your System Security Plan or compliance workbook and note where each protection is applied (endpoint, mail, web, server) to satisfy SI.L1-B.1.XIII mapping.

Summary — within 30 days you can scope your environment, deploy endpoint and gateway protections, validate operation, and produce the documentation required for FAR 52.204-21 / CMMC 2.0 Level 1 compliance: prioritize high-risk locations (email, endpoints, servers, web), apply managed protections with default hardened settings, verify with tests, and keep clear, dated evidence of configurations and tests to demonstrate compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes