🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SI.L2-3.14.5

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SI.L2-3.14.5

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SI.L2-3.14.5 – Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

Understanding the Requirement

This control requires that your organization perform both scheduled (periodic) scans of systems and continuous (real-time) scanning of files that come from external sources so malware cannot install or run undetected. The goal is to define how often full and incremental scans run, ensure those scans actually occur on the defined schedule, and enable on-access scans that inspect files when they are downloaded, opened, or executed. Following the NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 guidance ensures these activities are documented, enforced, and monitored.

Technical Implementation

  • Deploy enterprise anti-malware across endpoints and servers. Use a centrally managed solution (not standalone consumer AV) that supports on-access (real-time) scanning, scheduled full scans, automatic signature and engine updates, and centralized policy enforcement. Ensure coverage for Windows, macOS, Linux, and key servers.
  • Enable real-time scanning for external content. Configure the product to scan files on download, when opened, and at execution time. Include browser downloads, email attachments, file shares, and removable media. For cloud-synced folders, enable local scanning of files as they arrive.
  • Define and implement scanning frequency in policy. Document a scanning frequency policy: for example, full system scan weekly (e.g., Friday 17:00), daily quick scans, and continuous on-access scanning. Record who approves exceptions and where the policy lives (policy repository or intranet).
  • Centralize management, logging, and alerting. Use the management console to push policies, collect scan/compliance reports, and forward suspicious detections to your SIEM or log collector. Configure alerts for malware detections and failed scans so IT staff can respond promptly.
  • Maintain signature/engine updates and leverage cloud/behavioral detection. Configure automatic signature and engine updates at least daily (prefer immediate updates). Enable cloud-based threat intelligence and behavioral/heuristic detection to reduce reliance on signatures alone.
  • Handle exclusions, exceptions, and removable media safely. Create a documented process for approved exclusions (with business justification), keep the list minimal, and periodically review it. Ensure removable media gets scanned on insertion and use device control policies to restrict unknown media.

Example in a Small or Medium Business

A small engineering firm purchases an enterprise anti-malware suite with a cloud-managed console and installs agents on all 40 employee laptops and two file servers. The IT lead creates a malware scanning policy that specifies on-access scanning for downloads, email attachments, and USB devices, and schedules a full system scan weekly on Friday at 5:00 PM when activity is low. Agents are configured to update signatures automatically and to use cloud behavioral analysis to catch unknown threats. The management console is set to send alerts to the sysadmin and to log events to the firm's log server for retention and review. The firm documents an exclusions process requiring manager approval and quarterly review to avoid risky exceptions. When the console reports a detection on a workstation, the sysadmin isolates the device, performs a forensic scan, removes the malware, and restores the system from a validated backup while recording the incident. This workflow assures business leaders that periodic and real-time scanning are working and that detections are handled consistently.

Summary

Combining a clear policy that defines scan frequency and exception handling with a centrally managed anti-malware solution that enforces real-time scanning of external files, schedules periodic full scans, updates threat data automatically, and produces actionable logs will meet this requirement. For SMBs, practical steps are: pick an enterprise-grade product, enable on-access scanning for downloads/open/execute events, schedule regular full scans, ensure automatic updates, and monitor detections through centralized alerts and reporting—then make system/network administrators responsible for enforcement and review.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes