🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Endpoint Security to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XV: Real-Time Scans on Download, Open, Execute

Step-by-step guidance to configure endpoint security for real-time scanning on download, open, and execute to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 requirements for small businesses.

•
April 22, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to configure endpoint security so that files are scanned in real time when downloaded, opened, or executed — a practical how-to to help small businesses meet FAR 52.204-21 basic safeguarding requirements and the CMMC 2.0 Level 1 control SI.L1-B.1.XV.

Understanding the requirement and key objectives

FAR 52.204-21 mandates basic safeguarding of contractor information systems; CMMC 2.0 Level 1 SI.L1-B.1.XV specifically calls for real-time scanning on download, open, and execute to prevent malicious code from reaching Controlled Unclassified Information (CUI) or other sensitive data. The key objectives are (1) detect malicious files at the earliest entry point, (2) block or quarantine malicious artifacts before execution, and (3) retain logs and evidence to demonstrate the controls are configured and operating.

High-level implementation approach (Compliance Framework practical steps)

Start with a baseline policy: enable on-access (real-time) scanning, cloud-assisted protection (where available), and file-type-specific scanning for downloads and archives. Use a cloud-managed endpoint product (Microsoft Defender for Business, CrowdStrike Falcon Prevent, SentinelOne, Sophos Intercept X, Bitdefender GravityZone, etc.) so policies are centrally enforced and you can export evidence. Document the baseline as a compliance policy (policy name, baseline version, date, scope) and map it to the FAR/CMMC requirement in your Compliance Framework artifact repository.

Platform-specific configuration details

Windows (typical small-business environment): use Microsoft Defender (or your chosen AV/EDR) and enforce these settings via Group Policy or Intune: - Enable Real-time protection / On-access scanning. - Enable "Scan downloaded files and attachments" (Intune policy: Endpoint security > Antivirus > Microsoft Defender > Real-time protection). - Enable Cloud-delivered protection and automatic sample submission for faster detection. - Configure archive and compressed file scanning and set a reasonable max unpack depth. Example PowerShell checks and commands: Get-MpComputerStatus | Select AMRunning,AMServiceEnabled,RealTimeProtectionEnabled Set-MpPreference -DisableRealtimeMonitoring $false Set-MpPreference -DisableIOAVProtection $false For macOS and Linux, install and enforce your vendor client (CrowdStrike/SentinelOne) and ensure on-access scanning hooks are enabled (kernel extensions or native file system observers). For Linux servers, where native on-access scanning is limited, enforce EDR policies that block execution of untrusted binaries and use inotify-based scanning where supported.

EDR/AV tuning, exclusions, and performance considerations

Real-time scanning can impact performance if not tuned. Identify trusted high-I/O directories to exclude (backup repositories, virtual machine images, database data files) but keep exclusions as narrow as possible (specific paths and file patterns). Avoid excluding entire user profile directories. Use SHA256 hash whitelisting for approved build artifacts and sign internal executables and allow signed-only execution where practical. Configure archive scanning depth (e.g., unpack archives up to 3 levels deep) and block scanning for extremely large single files by size threshold. Maintain definition and engine update cadence (automatic within 24 hours) and monitor missed-update alerts.

Testing, logging, and evidence collection for audits

Build a test plan and capture evidence: deploy the policy to a pilot group, use the EICAR test file to validate detection on download and execution, download a zipped EICAR and open it to confirm archive scanning, and test macro-enabled Office files to verify on-open scanning blocks malicious macros. Collect evidence: exported policy from the console, screenshots of endpoint settings, logs showing detection events, and SIEM queries. Example SIEM query (conceptual): search your Windows/EDR feed for "threat detected" or inspect Microsoft-Windows-Windows Defender/Operational logs for detection events; for Splunk/Elastic adapt to your schema and include time-range, hostname, user, file hash, and action taken. Retain these artifacts per your contract’s evidence retention requirements.

Real-world small-business scenario

Example: Acme Engineering (12 employees) uses Microsoft 365 and Windows 10/11 endpoints. They enable Defender for Business via Intune, set "Scan downloaded files and attachments" to Enabled, configure cloud-delivered protection, and block unsigned PowerShell scripts. During rollout, users reported slow file operations in their CAD folder; Acme created a scoped exclusion for the CAD temp folder (only .svgl and .tmp files) and enabled hash whitelisting for the CAD application installer. They validated protections using EICAR and a macro test file, stored policy exports and detection logs in the compliance folder, and documented the process for FAR/CMMC review.

Risks of not implementing the control and response planning

Failure to implement real-time scans increases risks of ransomware, credential theft, and lateral movement because malicious files may execute before detection. Non-compliance risks include contract penalties, inability to bid on future DoD work, and reputational damage. Mitigate by integrating detection with an incident response playbook: automatic quarantine, alerting to SOC or MSP, immediate endpoint isolation for high-risk detections, and a triage checklist (collect memory image, process list, network connections, file hash) so you can produce evidence of containment and remediation.

Compliance tips and best practices

Keep these practical tips: (1) Use centrally managed policies and version them; (2) schedule frequent validation tests (monthly EICAR and macro tests); (3) forward endpoint detections to a SIEM and create a dashboard for "on-access detections" and policy drift; (4) limit exclusions and document each with a business justification and expiration date; (5) require signed code and use application control where possible; (6) train users to report blocked downloads and provide a quick support path to avoid shadow workarounds that bypass protections.

Summary: Implementing SI.L1-B.1.XV is straightforward for small businesses when you use a centrally managed endpoint security product, enable on-access scanning for downloads/opens/executions, tune exclusions carefully, test with EICAR and macro samples, and collect policy and log evidence. Proper configuration, testing, and documentation will satisfy FAR 52.204-21 / CMMC 2.0 Level 1 expectations and significantly reduce the likelihood of malware-related incidents.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes