🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a Compliance Checklist for Updating Malicious Code Protection (FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIV)

Step-by-step guidance and a practical checklist to ensure your malicious code protection (antivirus/anti-malware) is kept current and auditable to meet FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIV requirements.

•
April 15, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Keeping malicious code protection current is a basic but critical Compliance Framework requirement mapped to FAR 52.204-21 and CMMC 2.0 Level 1 control SI.L1-B.1.XIV; this post gives a practical, auditable checklist and implementation guidance so small businesses can update antivirus/anti‑malware systems reliably and prove compliance during assessments.

Why this control matters (risk overview)

Malicious code protection that is not updated exposes systems to known malware, ransomware, and supply-chain threats; attackers exploit stale signatures or disabled protection to gain persistence and exfiltrate data. For contractors governed by FAR 52.204-21 a failure to maintain basic safeguarding can lead to contract penalties, loss of contract eligibility, and reputational damage. From a threat perspective, the most common attack vectors for small businesses are phishing-delivered malware and commodity ransomware that are defeated by timely signature and engine updates—so update cadence and verifiable evidence matter.

Core checklist items (what to include)

Design your checklist as a series of actionable, evidence-backed items. At minimum include: (1) scope and inventory of endpoints and servers with installed protection, (2) update sources and allowed update methods (cloud/streaming, vendor CDN, internal mirror), (3) update frequency and SLA (e.g., signature updates daily, heuristic/behavior model updates weekly, critical fixes within 24–72 hours), (4) configurations enforcing automatic updates and tamper protection, (5) central monitoring/logging of update status, (6) periodic verification test steps and exported artifacts, and (7) owner, review cadence, and change-control records.

Technical controls: how to implement and validate

Implement centralized management (Microsoft Defender for Endpoint, Intune, SentinelOne console, Sophos Central, CrowdStrike Falcon, etc.) so policy and update status are enforceable. For Windows endpoints, add a verification command to your checklist: run Get-MpComputerStatus in PowerShell and capture AntispywareSignatureLastUpdated and AntivirusSignatureLastUpdated values; include the exported JSON or CSV as evidence. For Linux systems running ClamAV, confirm freshclam is scheduled (check /etc/cron.d/freshclam or systemd timer) and capture /var/log/clamav/freshclam.log. For macOS, document Jamf or MDM records showing XProtect and third‑party AV update timestamps. Also include checks for tamper protection (e.g., Microsoft Defender TamperProtection enabled) and prevention of service/agent disablement by non-admin users.

Operational controls: schedules, roles, and audit evidence

Operationalize the checklist by assigning an owner (e.g., "Security Operations Lead"), defining a cadence (daily automated checks, weekly manual review, quarterly audit), and specifying required evidence: screenshots of management console dashboards, exported endpoint status reports, syslog/SIEM entries showing successful updates, and change control tickets for any manual engine or signature updates. Add a test step that simulates stale signatures: temporarily roll back a test endpoint's definitions and verify detection of a clean test indicator (EICAR) to confirm signature application. Record each review in a compliance log (spreadsheet or ticketing system) with date, reviewer, and actions taken.

Small‑business real-world scenarios

Example 1 — 12-person engineering subcontractor: Use Microsoft Defender (bundled with Windows 10/11) + Intune for policy enforcement. Checklist items: enable cloud-delivered protection, set real-time protection on, enforce tamper protection via Intune configuration profile, schedule daily report export of Get-MpComputerStatus across all endpoints, and store the reports in a secure SharePoint folder tagged for compliance evidence. If offline systems exist, implement a weekly local signature mirror using an internal update server and document the sync log.

Example 2 — 25-person legal firm using mixed OS: Deploy a commercial AV managed console (e.g., Sophos Central). Checklist items: onboard all devices in the console, set automatic definition updates, configure alerts for any agent older than 48 hours, train the helpdesk to escalate alerts to the security owner, and maintain a quarterly audit binder that contains export of agent versions, update timestamps, and helpdesk tickets showing remediation actions. For remote attorneys with unreliable connectivity, include instructions for USB-based update packages and log collection steps with hash verification of update files.

Compliance evidence, testing, and auditor-friendly artifacts

Auditors want reproducible artifacts tied to checklist items. Include the following evidence types in your checklist: management console reports showing per-device last‑update timestamp, exported PowerShell/CLI output saved with timestamps, SIEM/central log entries showing download success codes (HTTP 200 or vendor-specific codes), change control tickets for manual updates, and copies of policies (GPO/MDM profiles) that enforce update behavior. Define a verification test in the checklist: pick a sample of endpoints monthly, run the status command, and attach the raw output plus a short memo describing remediation steps for any failures. Keep evidence retention consistent with contract requirements (commonly 12–36 months).

Best practices and practical tips

Automate as much as possible: use endpoint management to prevent human error, enable streaming cloud updates if supported (reduces window of vulnerability), and turn on tamper protection and least-privilege for local users. Maintain an offline update plan for air-gapped systems. Use a combination of signature-based protection and an endpoint detection/response (EDR) agent where feasible—EDR covers behavioral threats that signatures miss. Regularly review vendor advisories and subscribe to threat intelligence feeds for emergent signature updates; document how you applied vendor-suggested mitigations. Finally, train staff to never disable protection and log any approved exceptions with formal change control and compensating controls (isolated network segment, increased monitoring).

Summary: Build your checklist around inventory, automated enforcement, measurable update SLAs, and auditor-friendly evidence. For small businesses that must meet FAR 52.204-21 and CMMC Level 1 SI.L1-B.1.XIV, prioritize centralized management, daily signature verification, tamper protection, and a documented verification process that produces exportable artifacts—these practical steps will reduce risk and provide clear proof of compliance during assessments.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes