🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Choose and Deploy Scanning Tools for Periodic and On-Access Scans: FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XV Tool Selection Guide

Practical guidance for selecting and implementing on-access and periodic scanning tools to meet FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XV requirements for small businesses.

•
April 01, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how small businesses can choose and deploy scanning tools to meet the periodic and on‑access scanning expectations in FAR 52.204‑21 and CMMC 2.0 Level 1 (SI.L1‑B.1.XV) with actionable, practical steps, tool recommendations, and example deployment patterns that align with a Compliance Framework approach.

What the control requires and the implementation objective

The core objective of this control under the Compliance Framework is to detect malware, unauthorized changes, and known vulnerabilities on systems that store or process Federal Contract Information (FCI) or other controlled data. Practically this means you need real‑time (on‑access) scanning to block or quarantine active threats and periodic (scheduled) scans to find latent infections and configuration issues that on‑access scans may miss. Evidence of configuration, scheduling, logging, and remediation activity is required for audits.

Types of scanning tools to consider

For small businesses you will typically combine multiple tool types: (1) on‑access anti‑malware/EDR agents for real‑time detection and containment (e.g., Microsoft Defender for Business, CrowdStrike, Sophos), (2) periodic vulnerability scanners for missing patches and misconfigurations (e.g., Tenable Nessus, Qualys, OpenVAS/Greenbone), and (3) specialized scanners where relevant — container/image scanners (Trivy, Anchore) for CI/CD, and file integrity monitoring (OSSEC/Wazuh) for critical servers. Choose tools that provide central management, logging, and an API for automation so evidence can be exported to your SSP or audit package.

Selection criteria and technical details

Use a simple scoring matrix against criteria that matter for Compliance Framework needs: detection capability (signatures + heuristics + behavioral), timeliness of updates (daily or better), resource impact on endpoints, centralized visibility and alerting, support for credentialed scans (for vulnerability scanners), logging retention and export formats (syslog, JSON), agent vs agentless coverage, OS and cloud workload support, and total cost of ownership. For vulnerability scans, prefer credentialed scans (SSH, WinRM/SMB) so the scanner can detect missing patches and insecure configurations; configure the scanner with an account that has read access but limited extra privileges. For on‑access scanning, ensure real‑time protection is enabled, and configure exclusions only after documented testing to avoid blind spots.

Practical deployment steps for a small business (example: 25 endpoints, 3 servers)

1) Inventory: build an asset list (hostname, OS, criticality, IP). 2) Choose on‑access agent: enable Microsoft Defender for Business on Windows machines and ClamAV or vendor EDR on Linux servers if budget is tight. 3) Configure real‑time protection, enable cloud‑delivered protection and auto‑sample submission, and turn on tamper protection where available. 4) Schedule periodic scans: quick daily scans + full weekly scans on endpoints, and monthly authenticated vulnerability scans on servers. 5) Deploy a vulnerability scanner (Nessus Essentials or OpenVAS) from a hardened host on the management network and run credentialed scans using a service account with necessary access. 6) Integrate alerts with a ticketing system (Jira, ServiceNow) and central logging (Splunk, ELK, or a managed SIEM). 7) Document scan schedules, exceptions, and remediation SLAs in your policies and SSP.

Real-world examples and tuning

Example 1 — Low budget: A 10-person consultancy uses Microsoft 365 Business Premium with Defender for Business enabled for on‑access scanning and schedules weekly Nessus Essentials hosted on a small VM for monthly credentialed scans of file servers. They set quick scans nightly, restrict exclusions to a tested list, and export logs to a lightweight ELK stack for 90 days of evidence.

Example 2 — Growing small business: A contractor with 50 endpoints uses Defender for Endpoint (EDR) for on‑access protections and Tenable.io for periodic scans. They run credentialed scans after each monthly patch window and automatic endpoint isolation on high‑confidence detections. They maintain a POA&M for findings and integrate scan results into their monthly security review for their CMMC auditor.

Risks of not implementing or misconfiguring scans

Failing to implement adequate on‑access and periodic scans leaves you vulnerable to persistent malware, ransomware, and data exfiltration and can lead to loss of FCI, contract termination, fines, and reputational damage. Misconfigured scans (too many exclusions, uncredentialed vulnerability scans, disabled on‑access protection) produce false negatives and create audit findings that are difficult to remediate. Additionally, lacking centralized logs or documentation means you cannot demonstrate compliance during an audit of FAR 52.204‑21 or CMMC assessments.

Compliance tips and best practices

Keep these practical tips: document your tool selection rationale in the SSP; run a short pilot (5–10 endpoints) to measure performance and false positives; require signature/definition updates at least daily; tune vulnerability scanner credentials to minimize intrusive checks; retain scan logs and remediation evidence for the period required by your contracting guidance (commonly 90 days or more); automate remediation tickets from high‑confidence findings; and include scanning policies in routine security training for admins. For cloud and containers, use image scanners in CI/CD to prevent vulnerable images from reaching production.

In summary, meet FAR 52.204‑21 and CMMC 2.0 Level 1 SI.L1‑B.1.XV by combining agent‑based on‑access scanning with scheduled credentialed vulnerability scans, choosing tools that provide central management, logging, and automation, and documenting schedules, exceptions, and remediation. For small businesses, leverage built‑in platform tools where possible (e.g., Microsoft Defender), augment with targeted vulnerability scanning, pilot before broad rollout, and maintain evidence and tuning to reduce noise and prove compliance during assessments.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes