This post explains how to choose, deploy, and test antimalware tools so your organization can demonstrably meet FAR 52.204-21 and CMMC 2.0 Level 1 control SI.L1-B.1.XIII requirements—covering selection criteria, concrete configuration steps, test procedures (safe and repeatable), and the types of evidence auditors expect from a small business.
What the control requires and how it maps to practical actions
At a high level FAR 52.204-21 and CMMC Level 1 SI.L1-B.1.XIII require basic safeguarding of contractor information systems against malware: you must have antimalware protections in place, keep them current, and be able to show they work. Practically that means an inventory of endpoints, an approved antimalware product deployed across those endpoints, automatic signature/definition updates, centralized logging or exportable telemetry, and test evidence demonstrating detection/isolation actions. For small businesses this often maps to a single managed endpoint protection product (AV or EDR) with managed updates and logging turned on.
How to choose an antimalware product (selection criteria)
Selecting the right product starts with capability and implementation fit. Key criteria: (1) detection types — signature, heuristic, behavioral/ML, and on-access scanning; (2) centralized management console with role-based access and audit logs; (3) update cadence — automated signature and engine updates at least daily; (4) telemetry export — ability to forward events to a SIEM, Syslog, or cloud log store for retention and audit; (5) quarantine and remediation features with automated isolation (network isolation or host quarantine via MDM); (6) platform coverage — Windows, macOS, Linux, mobile as needed; (7) performance and compatibility with your apps; (8) vendor support and evidence artifacts (reports, exportable CSV/JSON). For small businesses consider managed solutions like Microsoft Defender for Business, SentinelOne, CrowdStrike, or a reputable cloud AV with MDM integration to reduce administrative burden and provide easier evidence exports.
Deployment and configuration: hard requirements for compliance
Implementation steps you can follow: (1) build an inventory of all endpoints (workstations, servers, VMs, laptops, removable media endpoints) and map them to user roles; (2) choose an enforcement method (group policy, Intune/MDM, or vendor installer) to ensure consistent deployment; (3) enable real-time scanning, scheduled full system scans (weekly), and automatic signature/engine updates; (4) set quarantine policy to retain artifacts for at least 30–90 days and configure automated remediation or require analyst approval per your process; (5) enable logging at the endpoint and central console, and configure forward to a SIEM or secure log store with immutable retention if contract rules require it; (6) lock down management console access using MFA and role separation so audit trails exist for configuration changes.
Tuning, exclusions, and documentation
Tuning is important to avoid false positives and maintain usability: document any exclusions (path, process, file hash) with justification, date, approver, and automatic review schedule. Use hash-based allowlisting (SHA256) instead of broad folder exclusions where possible. Document the baseline configuration (screenshot of console settings, engine version, signature version) and store it in your compliance repository. Keep a change log for updates to policies and product versions; auditors expect to see why and when a change was made.
Testing the antimalware solution: safe, repeatable methods
Testing validates the configuration and generates the audit evidence you need. Start with non-malicious checks: deploy the EICAR test file to a subset of endpoints and confirm detection, quarantine, and console alert generation. Next, validate update behavior by rolling back the signature version on a test machine (or temporarily blocking updates) and confirming alerts when a previously-detected indicator is introduced. For behavioral detection, use approved simulation frameworks such as Atomic Red Team to run safe, documented test cases (e.g., command and control simulations like T1059.001 or fileless PowerShell execution) in an isolated lab — always with documented scope and approvals. Record command outputs, console alerts, timestamps, and exported logs (JSON/CSV) as part of the evidence package. Never run live malicious binaries on production endpoints; if you must run real samples, do so in an isolated, air-gapped lab under supervision and with legal/organizational approvals.
Small-business test scenario (practical)
Example: a 25-seat defense subcontractor uses Microsoft Defender for Business managed via Intune. Test plan: (1) push EICAR via a scheduled script to 5 test endpoints; (2) verify Defender quarantined the file and generated an alert in the Security Center; (3) export the alert to CSV and archive it in the compliance folder; (4) simulate a phishing attachment with a benign macro that launches PowerShell and run a corresponding Atomic Red Team technique in an isolated VM to confirm behavioral detection; (5) document timestamps, screenshots of console alerts, and the remediation steps taken. This package—inventory, deployment screenshots, test plan, test outputs, and remediation logs—meets auditors’ expectations for evidence.
Evidence, audit artifacts, and continuous verification
Auditors will want to see: inventory mapping (endpoint list), deployment artifacts (package installer logs, MDM deployment records), baseline configuration screenshots, signature/engine version history, test plans, test results (EICAR detection logs, console screenshots, exported telemetry), and incident/remediation logs showing that a detected infection was handled. Store these artifacts in a versioned compliance repository (PDFs, CSVs, JSON exports) with retention aligned to contract needs. Automate periodic checks: weekly update verification, monthly EICAR tests in a small sample, and quarterly behavioral simulations documented with change logs. Automation reduces audit prep time and shows ongoing compliance rather than a one-time effort.
Risks of not implementing or testing antimalware properly
Failing to deploy or test antimalware creates tangible risks: ransomware or data exfiltration that compromises CUI, contract penalties or termination for non-compliance with FAR/CMMC clauses, reputational damage, and potential downstream supply chain compromise for your prime contractors. Technically, missing centralized logging or failing to validate quarantine behavior means you may not detect lateral movement or fileless attacks, leaving endpoints as persistent footholds for adversaries. Lack of documented tests and evidence is often as damaging in an audit as the technical failure itself—auditors need proof you actually validated defenses.
In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIII requires selecting an antimalware product with modern detection and centralized management, deploying it consistently across an inventoried estate, configuring automatic updates and quarantine, and running safe, repeatable tests (EICAR, behavioral simulations) while capturing exportable evidence. For small businesses, managed offerings and clear documentation reduce overhead—focus on repeatable procedures, retained logs, and a compact evidence bundle (inventory, screenshots, exports, test results) that proves your protections work and are maintained.