🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Endpoint AV/EDR for Real-Time Scans on Downloaded, Opened, or Executed Files: Practical Steps for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XV

Step-by-step guidance to configure endpoint AV/EDR to perform real-time scans of downloaded, opened, and executed files to meet FAR 52.204-21 / CMMC 2.0 Level 1 SI.L1-B.1.XV requirements.

•
March 31, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to configure endpoint antivirus (AV) and endpoint detection and response (EDR) products to perform real-time scans of files when they are downloaded, opened, or executed — a specific implementation to meet FAR 52.204-21 and CMMC 2.0 Level 1 control SI.L1-B.1.XV for small and medium organizations.

What the control requires and why it matters

At Level 1, SI.L1-B.1.XV requires that endpoints be protected by controls that detect and prevent malicious content as files enter or run on systems. Practically this means enabling on-access (real-time) scanning and behavioral monitoring in your AV/EDR so that files coming from the web, email, removable media, or other sources are scanned when downloaded, opened, or executed. This reduces the risk of malware execution, data exfiltration, and compromise of controlled unclassified information (CUI) or contract data.

Practical implementation steps (high-level)

Follow these steps as a practical checklist when configuring AV/EDR for compliance:

1) Policy design and mapping

Create a written configuration baseline that maps product settings to SI.L1-B.1.XV. Define: enable on-access scanning, scan on open and execute, scan archives and compressed files, enable cloud-assisted/heuristic detection, and enable behavioral EDR sensors. Document expected values and acceptable exceptions (justified in a signed exemption request).

2) Configure the endpoint product

Using your AV/EDR management console, enable the following features for all managed endpoints: - On-access/real-time scanning (sometimes called "OnExecute", "OnOpen" or "File system scanning"). - Scan of downloaded files and browser-download interception (if available). - Scan of archives and nested containers (zip, rar, iso) and optionally enable heuristics/behavior analysis for scripts and macros. - Cloud-delivered protection and sample submission (to improve detection). - Behavioral EDR sensors (process monitoring, creation, injection, script activity). Examples: in Microsoft Defender enumerate that Real-time Protection is enabled and that you are capturing Microsoft-Windows-Windows Defender/Operational events; in other vendors (CrowdStrike, SentinelOne, Sophos) enable "On-access scanning" policies in the central console and ensure they are applied to all endpoint groups.

3) Harden exceptions and exclusions

Keep exclusions narrow and documented. Avoid blanket folder or extension exclusions. If you must exclude a directory (for performance or compatibility), document hostname(s), process owners, risk compensating controls, and implement hash-based allowlisting for binaries instead of path-based exclusions where possible. Use code-signing checks: allow only signed executables in critical locations when feasible.

4) Logging, telemetry, and evidence collection

Turn on detailed logging for on-access events and integrate endpoint telemetry into your SIEM. Collect: - EDR/AV event logs showing OnAccessScan/OnOpen/OnExecute events. - ProcessCreate and FileCreate events (via Sysmon or native OS logs). - Policy export screenshots from your EDR console proving the real-time scan feature is enabled. For Windows, verify with tools like Get-MpComputerStatus (or equivalent vendor reporting) and collect logs from Microsoft-Windows-Windows Defender/Operational or vendor-specific channels.

Real-world examples and scenarios for a small business

Example 1 — 25-person engineering firm: deploy Microsoft Defender configured via Group Policy / Intune. Steps: enable real-time protection, configure cloud-delivered protection and sample submission, enable archive scanning, push configuration via Intune device configuration profile, and verify with Get-MpComputerStatus across a sample of endpoints. Collect screenshots of Intune policy assignments and Defender event logs for the audit pack.

Example 2 — Small MSP-managed environment using CrowdStrike: create a single "Prevent" policy with On-Access scanning and script control enabled. Use the console to exclude only a signed installer used by a legacy application and record the exclusion request and approval. Schedule a quarterly scan and validate that the EDR is observing FileWrite/FileOpen events for downloaded installers.

Testing, detection tuning, and handling false positives

Test with benign test files (EICAR) in controlled scenarios to confirm OnDownload/Open/Execute triggers detections. Conduct table-top exercises to validate alert triage and remediation: quarantine, rollback (if supported), or manual removal. Tune heuristics carefully — high sensitivity increases false positives; low sensitivity increases risk. Maintain a documented suppression workflow where analysts can submit false-positive artifacts and a process to update allowlists only after safe verification.

Risk of not implementing the requirement

If real-time scanning and behavioral EDR are not properly enabled, incoming malicious files can execute before detection, leading to ransomware, credential theft, lateral movement, and loss of CUI — all of which can result in contract noncompliance, regulatory penalties, and reputational damage. For FAR 52.204-21 and CMMC Level 1, missing demonstrable controls during an assessment can result in corrective actions or loss of contract eligibility.

Compliance tips and best practices

- Keep AV/EDR signatures and engines up to date via automated update policies. - Centralize policy management and enforce via MDM/EPP console so endpoints cannot disable protection. - Collect and retain 90 days of event data (or longer if required by your contracting requirements) to support audits. - Document every exception and the compensating controls used. - Combine endpoint scans with gateway protections (email and web filters) to reduce exposure before files reach endpoints.

In summary, meeting FAR 52.204-21 / CMMC 2.0 Level 1 SI.L1-B.1.XV is achieved by enabling and documenting on-access scanning and EDR behavioral monitoring for downloaded, opened, and executed files, applying those settings consistently across your estate, logging relevant events, and maintaining a documented exception and validation process; doing so materially reduces your risk of malware execution and produces the artifacts auditors expect to see.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes