🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement Malicious Code Protection Across Endpoints and Servers: FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII Step-by-Step Guide

Step-by-step guidance for small businesses to implement malicious code protection across endpoints and servers to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIII requirements.

•
April 20, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This guide explains how to implement malicious code protection across endpoints and servers to meet FAR 52.204-21 and CMMC 2.0 Level 1 (Control SI.L1-B.1.XIII) requirements, with practical, step-by-step actions, small-business examples, and technical configuration notes you can apply today.

Why this control matters for Compliance Framework

FAR 52.204-21 requires basic safeguarding of covered contractor information systems, and CMMC 2.0 Level 1’s SI.L1-B.1.XIII specifically expects protection against malicious code on endpoints and servers; implementing this control reduces the risk of malware-driven data loss, ransomware, and unauthorized system access that would jeopardize CUI, contract performance, and regulatory compliance.

Step-by-step implementation

1) Scope and inventory (identify endpoints, servers, and CUI touchpoints)

First, build an accurate inventory: list all Windows and macOS desktops/laptops, Linux and Windows servers, virtual machines, mobile devices that access CUI, and any OT/embedded systems that integrate with IT. Use an asset discovery tool (e.g., Microsoft Intune/Azure AD device inventory, an open-source Nmap scan combined with OS detection, or an RMM tool for managed environments). Tag assets that process or store CUI so protection can be prioritized. Implementation notes: capture OS versions, installed agents, network segments, backup schedule, and admin accounts for each asset.

2) Select the proper protection stack for endpoints and servers

Choose products that provide signature-based anti-malware plus behavioral/EDR (endpoint detection and response) capabilities. For small businesses, cost-effective options include Microsoft Defender for Business + Defender for Endpoint, SentinelOne Core, CrowdStrike Falcon Prevent, or Sophos Intercept X; for Linux servers, consider Falco, CrowdStrike Linux sensor, or a combination of ClamAV + rkhunter/AIDE for integrity checks. Example scenario: a 25-person engineering subcontractor can deploy Defender for Business via Microsoft 365 Business Premium, enroll devices in Intune for centralized policy, and enable Defender's tamper protection and cloud-delivered protection to satisfy the control.

3) Deploy, configure, and harden agents

Deploy agents with a central management console and enforce the following baseline settings: real-time protection enabled; automatic signature and engine updates (at least daily, preferably hourly for cloud-fed updates); behavioral/EDR sensors active for memory and process inspection; enable exploit mitigation; enable network protection/URL filtering where available. For servers, enable kernel-level scanning where supported and configure safe exclusions (e.g., backup directories, virtualization image stores) with strict rules to avoid blind spots. Technical specifics: enable tamper protection, require agent version >= vendor recommended, configure exclusions using hashes rather than wildcards when possible, and enable full-disk scheduled scans weekly with incremental scans daily.

4) Monitoring, logging, and detection tuning

Forward endpoint and server alerts to a central logging platform or SIEM (commercial or lightweight cloud SIEM) and set retention consistent with your compliance posture (e.g., 90 days minimum for investigative capability). Create alert rules for high-fidelity indicators such as execution from temporary directories, PowerShell with encoded commands, new persistence entries, or unusual outbound connections. Tune to reduce false positives — whitelist validated business tools by hash or publisher — while preserving telemetry needed for compliance evidence. Implementation tip: enable EDR telemetry ingestion into your SIEM and create a playbook that maps alerts to required evidence for FAR/CMMC audits.

5) Validate, test, and document

Validate the deployment by performing controlled tests: deploy the EICAR test file to confirm detection (do this in a controlled environment and follow vendor guidance), run simulated ransomware drills using tabletop exercises or safe emulation tools, and verify logging/alert workflows end-to-end. Maintain documentation: configuration baselines, agent deployment reports, update schedules, incident response playbooks, and proof of tests with timestamps. For audits, export centralized policy reports and EDR detection timelines showing that malicious code protection is active and effective.

Compliance tips and best practices

Adopt least privilege (remove local admin rights where possible) and application allowlisting (AppLocker or Microsoft Defender Application Control) to reduce attack surface. Integrate anti-phishing and secure email gateways to prevent malware delivery via attachments. Keep a documented patch management cadence (critical/important updates within 7 days where possible) because unpatched systems are a primary vector for malicious code. For small businesses without in-house security staff, consider a managed service provider (MSP) that provides centralized patching, EDR monitoring, and monthly compliance reports mapped to FAR/CMMC controls.

Risk of not implementing this requirement

Without effective malicious code protection, organizations face ransomware that can encrypt CUI and halt contract delivery, data exfiltration that leads to breach notifications and contract penalties, and supply-chain compromise that harms downstream partners. Noncompliance with FAR 52.204-21 or CMMC 2.0 can lead to lost contracts, remediation costs, reputational damage, and potential suspension from defense contracting. Technically, the lack of detection increases time-to-detect (TTD) and time-to-respond (TTR), giving adversaries more time to persist and escalate privileges.

Conclusion

Implementing malicious code protection across endpoints and servers to meet FAR 52.204-21 / CMMC 2.0 Level 1 SI.L1-B.1.XIII is a practical, achievable program: inventory assets, choose appropriate endpoint/EDR solutions, deploy and harden agents with centralized management, enable logging and SIEM ingestion, test detections, and document everything for audits. For small businesses, leveraging integrated platform offerings (e.g., Microsoft Defender ecosystem) or a trusted MSP can make the program affordable and auditable while materially reducing cyber risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes