{
  "title": "How to Create a Compliance Checklist for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIV: Evidence, Policies, and Logs to Prove You Update Malware Protections",
  "date": "2026-04-03",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-create-a-compliance-checklist-for-far-52204-21-cmmc-20-level-1-control-sil1-b1xiv-evidence-policies-and-logs-to-prove-you-update-malware-protections.jpg",
  "content": {
    "full_html": "<p>This post explains how to build a practical, auditable compliance checklist for FAR 52.204-21 / CMMC 2.0 Level 1 control SI.L1-B.1.XIV — specifically documenting evidence, policies, and logs that prove your organization updates malware protections; it focuses on actionable steps, sample evidence artifacts, technical commands, and a small-business implementation scenario tailored to the Compliance Framework.</p>\n\n<h2>What auditors expect and how this maps to Compliance Framework objectives</h2>\n<h3>Documents, policies, and proof</h3>\n<p>Auditors will look for a written policy that mandates anti-malware protection and update frequency, a documented inventory of devices in scope, proof that updates occur (logs, console reports, signatures), and an exception/change log for managed deviations. In Compliance Framework terms, map your artifacts to: Policy (what you require), Procedures (how you do it), Technical Controls (what tools you use), and Evidence (logs, screenshots, export reports). Required evidence items typically include a policy document, an endpoint inventory, AV/EDR configuration screenshots, automated update reports, and timestamped logs showing signature/engine updates.</p>\n\n<h2>Technical evidence and concrete examples</h2>\n<h3>Commands, console exports, and log examples</h3>\n<p>Collect both centralized reports (from your AV/EDR management console) and per-host evidence. For Windows Defender, export Get-MpComputerStatus output (PowerShell): Get-MpComputerStatus | Select AMProductVersion, AntivirusSignatureVersion, AMServiceEnabled, NISEngineVersion, AntivirusEnabled and save as a timestamped CSV/JSON. For Linux hosts with clamd/clamav, capture freshclam logs and 'clamscan --version'. From enterprise consoles (Microsoft Defender for Endpoint, CrowdStrike Falcon, Sophos Central) export the \"Signature Update\" or \"Telemetry\" report for the audit period. Capture the last successful update timestamp, the version/build, and success/failure counts. Retain these exports as immutable copies (write-once storage or hashed archives) to prove integrity during a compliance review.</p>\n\n<h2>Checklist items — what to include and how to structure them</h2>\n<p>Create a checklist that is both a process guide and an evidence collection matrix. Core items to include: (1) Policy: Antivirus & Anti‑malware Policy (version/date/approver). (2) Inventory: canonical list of endpoints, servers, mobile devices in scope, and owner. (3) Baseline config: AV/EDR configuration template (auto-update enabled, scheduled scans, exclusion rules documented). (4) Update schedule: frequency (daily signature checks, weekly engine updates), automated vs manual. (5) Proof: automated update reports, per-host Get-MpComputerStatus/clamav outputs, console export files, signed hashes of each export. (6) Logs & retention: where logs live, retention period (e.g., 90 days live, 1 year archive), and how to retrieve them. (7) Exceptions: documented exceptions with risk acceptance and compensating controls. (8) Review evidence: monthly or quarterly evidence review sign-off with timestamps and reviewer initials. Put this checklist into your Compliance Framework artifact repository and link to each evidence file path/ID to simplify audit navigation.</p>\n\n<h2>Small-business implementation scenario</h2>\n<p>Example: a 30‑employee small manufacturer with 40 endpoints uses Microsoft Defender for Endpoint and a Windows Server Update Services (WSUS) server. Implementation steps: deploy Defender with group policy or Intune to enable automatic definition updates; configure Defender to report to Defender for Endpoint and enable centralized reporting; schedule an automated weekly export of the \"Machine status\" and \"Signature version\" reports to a secure SMB share; run a monthly PowerShell job that collects Get-MpComputerStatus on every host and saves a signed CSV to the archive; keep update logs for 12 months and record monthly evidence-review sign-offs in the compliance repository. If a device fails to update, the admin follows a documented remediation workflow and records the incident ID and resolution in the exception log — all of which become audit evidence.</p>\n\n<h2>Compliance tips and best practices</h2>\n<p>Automate evidence collection wherever possible: scheduled exports, host-level scripts, and SIEM ingestion make proof repeatable and reliable. Use immutable storage (WORM, Azure immutable blobs, or offsite hashed archives) for audit artifacts. Keep a change-control trail: link AV configuration changes to your change-management system (ticket ID, approver, rollback plan). Test detection and update flows quarterly by deploying a benign test file or using vendor-provided test signatures (e.g., EICAR) and capture the detection evidence. Document exceptions with timeframe and compensating controls, and ensure your retention periods match both contractual and regulatory requirements stipulated in the Compliance Framework.</p>\n\n<h2>Risks of not implementing this control correctly</h2>\n<p>Failing to maintain and prove timely malware-protection updates exposes your organization to higher malware infection risk, potential data compromise (including CUI), contract violations under FAR 52.204-21, lost business, and reputational harm. From a compliance perspective, weak or missing evidence can result in audit findings, corrective actions, suspension from federal contracting, or loss of certification status. Technical risks include ransomware, credential theft, lateral movement due to outdated signatures/engines, and inability to demonstrate reasonable security practices in the event of an incident.</p>\n\n<p>Summary — build the checklist as policy + automation + evidence: write a clear policy; instrument endpoints with centralized AV/EDR and automated update/export jobs; gather per-host and console evidence (PowerShell exports, console CSVs, signed archives); document exceptions and reviews; and retain artifacts according to your Compliance Framework retention schedule. These steps create an auditable trail proving you actively update malware protections and reduce both security and compliance risk.</p>",
    "plain_text": "This post explains how to build a practical, auditable compliance checklist for FAR 52.204-21 / CMMC 2.0 Level 1 control SI.L1-B.1.XIV — specifically documenting evidence, policies, and logs that prove your organization updates malware protections; it focuses on actionable steps, sample evidence artifacts, technical commands, and a small-business implementation scenario tailored to the Compliance Framework.\n\nWhat auditors expect and how this maps to Compliance Framework objectives\nDocuments, policies, and proof\nAuditors will look for a written policy that mandates anti-malware protection and update frequency, a documented inventory of devices in scope, proof that updates occur (logs, console reports, signatures), and an exception/change log for managed deviations. In Compliance Framework terms, map your artifacts to: Policy (what you require), Procedures (how you do it), Technical Controls (what tools you use), and Evidence (logs, screenshots, export reports). Required evidence items typically include a policy document, an endpoint inventory, AV/EDR configuration screenshots, automated update reports, and timestamped logs showing signature/engine updates.\n\nTechnical evidence and concrete examples\nCommands, console exports, and log examples\nCollect both centralized reports (from your AV/EDR management console) and per-host evidence. For Windows Defender, export Get-MpComputerStatus output (PowerShell): Get-MpComputerStatus | Select AMProductVersion, AntivirusSignatureVersion, AMServiceEnabled, NISEngineVersion, AntivirusEnabled and save as a timestamped CSV/JSON. For Linux hosts with clamd/clamav, capture freshclam logs and 'clamscan --version'. From enterprise consoles (Microsoft Defender for Endpoint, CrowdStrike Falcon, Sophos Central) export the \"Signature Update\" or \"Telemetry\" report for the audit period. Capture the last successful update timestamp, the version/build, and success/failure counts. Retain these exports as immutable copies (write-once storage or hashed archives) to prove integrity during a compliance review.\n\nChecklist items — what to include and how to structure them\nCreate a checklist that is both a process guide and an evidence collection matrix. Core items to include: (1) Policy: Antivirus & Anti‑malware Policy (version/date/approver). (2) Inventory: canonical list of endpoints, servers, mobile devices in scope, and owner. (3) Baseline config: AV/EDR configuration template (auto-update enabled, scheduled scans, exclusion rules documented). (4) Update schedule: frequency (daily signature checks, weekly engine updates), automated vs manual. (5) Proof: automated update reports, per-host Get-MpComputerStatus/clamav outputs, console export files, signed hashes of each export. (6) Logs & retention: where logs live, retention period (e.g., 90 days live, 1 year archive), and how to retrieve them. (7) Exceptions: documented exceptions with risk acceptance and compensating controls. (8) Review evidence: monthly or quarterly evidence review sign-off with timestamps and reviewer initials. Put this checklist into your Compliance Framework artifact repository and link to each evidence file path/ID to simplify audit navigation.\n\nSmall-business implementation scenario\nExample: a 30‑employee small manufacturer with 40 endpoints uses Microsoft Defender for Endpoint and a Windows Server Update Services (WSUS) server. Implementation steps: deploy Defender with group policy or Intune to enable automatic definition updates; configure Defender to report to Defender for Endpoint and enable centralized reporting; schedule an automated weekly export of the \"Machine status\" and \"Signature version\" reports to a secure SMB share; run a monthly PowerShell job that collects Get-MpComputerStatus on every host and saves a signed CSV to the archive; keep update logs for 12 months and record monthly evidence-review sign-offs in the compliance repository. If a device fails to update, the admin follows a documented remediation workflow and records the incident ID and resolution in the exception log — all of which become audit evidence.\n\nCompliance tips and best practices\nAutomate evidence collection wherever possible: scheduled exports, host-level scripts, and SIEM ingestion make proof repeatable and reliable. Use immutable storage (WORM, Azure immutable blobs, or offsite hashed archives) for audit artifacts. Keep a change-control trail: link AV configuration changes to your change-management system (ticket ID, approver, rollback plan). Test detection and update flows quarterly by deploying a benign test file or using vendor-provided test signatures (e.g., EICAR) and capture the detection evidence. Document exceptions with timeframe and compensating controls, and ensure your retention periods match both contractual and regulatory requirements stipulated in the Compliance Framework.\n\nRisks of not implementing this control correctly\nFailing to maintain and prove timely malware-protection updates exposes your organization to higher malware infection risk, potential data compromise (including CUI), contract violations under FAR 52.204-21, lost business, and reputational harm. From a compliance perspective, weak or missing evidence can result in audit findings, corrective actions, suspension from federal contracting, or loss of certification status. Technical risks include ransomware, credential theft, lateral movement due to outdated signatures/engines, and inability to demonstrate reasonable security practices in the event of an incident.\n\nSummary — build the checklist as policy + automation + evidence: write a clear policy; instrument endpoints with centralized AV/EDR and automated update/export jobs; gather per-host and console evidence (PowerShell exports, console CSVs, signed archives); document exceptions and reviews; and retain artifacts according to your Compliance Framework retention schedule. These steps create an auditable trail proving you actively update malware protections and reduce both security and compliance risk."
  },
  "metadata": {
    "description": "Step-by-step guidance for building an auditable checklist that proves you maintain, update, and log malware protections to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements.",
    "permalink": "/how-to-create-a-compliance-checklist-for-far-52204-21-cmmc-20-level-1-control-sil1-b1xiv-evidence-policies-and-logs-to-prove-you-update-malware-protections.json",
    "categories": [],
    "tags": []
  }
}