🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step: Configure Endpoint and Server Scans (Periodic + Real-Time Downloads) for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XV

Practical step-by-step guidance to configure periodic scans and real-time signature/definition updates for endpoints and servers to meet FAR 52.204-21 / CMMC 2.0 Level 1 SI.L1-B.1.XV compliance.

•
March 30, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a clear, actionable roadmap for small businesses and system administrators to configure periodic endpoint/server scans plus automatic, real-time signature/definition updates to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 control SI.L1-B.1.XV; it focuses on practical implementation steps, example commands, logging and evidence collection, and low-cost real-world approaches for small environments.

What the control expects and key objectives

At its core, the control requires that endpoints and servers are periodically scanned for malicious code and that malware signature/definition files (or equivalent detection content) are regularly and automatically updated — ideally in near real time. Objectives are (1) reduce dwell time by keeping detection engines current, (2) detect malware on a repeatable schedule (daily/weekly), (3) maintain centralized records of scans and updates for audit, and (4) apply these controls consistently across managed endpoints and servers in the Compliance Framework environment.

Implementation overview — strategy and architecture

Design a layered approach: (A) a centrally managed anti-malware/EDR agent on all endpoints and servers; (B) a schedule for quick/daily scans and a full weekly server scan; (C) automatic signature/definition updates enabled and monitored (real-time/continuous or at least hourly); and (D) centralized logging/retention so you can demonstrate compliance. For small businesses, this can be implemented using built-in tools (Microsoft Defender on Windows + Group Policy/Intune) and open-source agents for Linux (ClamAV + freshclam or a lightweight commercial EDR) with a syslog/SIEM or hosted logging solution for evidence collection.

Step-by-step: Windows endpoints and servers (example using built-in Defender)

1) Deploy Microsoft Defender Antivirus across all Windows endpoints via Group Policy, Intune, or a management tool. 2) Enable real-time protection: on each host (or via policy) ensure real-time monitoring is ON (PowerShell: Set-MpPreference -DisableRealtimeMonitoring $false). 3) Force or allow automatic signature updates: use scheduled Task or let Windows Update handle it; you can run Update-MpSignature manually or via Task Scheduler/Intune script (PowerShell: Update-MpSignature). 4) Schedule scans: run a quick automated scan daily and a full scan weekly. Example Task Scheduler action command to run a quick scan via script: Start-MpScan -ScanType Quick. 5) Centralize logs: forward Windows Event logs (Microsoft-Windows-Windows Defender/Operational) to a collector or enable Windows Event Forwarding to capture signature updates and scan results. Use these logs as artifacts for audit to show the update timestamps and scan results.

Step-by-step: Linux servers (example using ClamAV and freshclam)

1) Install ClamAV and the freshclam updater on Debian/Ubuntu: sudo apt-get install clamav clamav-daemon clamav-freshclam. 2) Configure freshclam (/etc/clamav/freshclam.conf): set Checks to a high value (e.g., Checks 24 for hourly checks) and ensure automatic updates are enabled; then systemctl enable --now clamav-freshclam.service. 3) Schedule scans via cron or systemd-timer: a weekly full scan (example cron: 0 3 * * 0 clamscan -r --infected --log=/var/log/clamav/fullscan.log /). 4) For on-access (real-time) detection on Linux, evaluate commercial agents or clamonacc/fanotify where available; better yet, use an EDR product that supports Linux for real-time blocking and centralized policy. 5) Retain scan logs and uploader scripts that push logs to your central log store (syslog, Wazuh, or cloud SIEM).

Central management, automation and evidence collection

Use a central console (Intune, Group Policy, EDR dashboard, or an open-source manager like Wazuh) to enforce policies and collect evidence. Automate: (a) agent deployment, (b) auto-updates for definitions, (c) scheduled scans, (d) log forwarding and (e) alerting on failed updates or scans. For evidence, keep: update timestamps, agent version and definition version tables, scheduled scan reports (with host name, time, result), and remediation records. Retain these artifacts per contract/audit requirements (common guidance: at least 90 days, but many DoD contracts expect up to 1 year — align with your Compliance Framework documentation).

Real-world small-business scenarios and practical tips

Scenario A — 25-employee office with Windows laptops and two Linux servers: Use Microsoft Defender for endpoints managed via Intune for Windows, configure automatic signature updates and daily quick scans; on Linux, install ClamAV with freshclam hourly checks and run a weekly full cron scan. Ship logs to a low-cost hosted SIEM or a Wazuh manager running in a small EC2 instance. Scenario B — mixed cloud-hosted servers on AWS: install the provider-recommended agent (e.g., CrowdStrike/CrowdStrike Free trial or Wazuh), enable automatic content updates, and use AWS Systems Manager run command to audit update status across instances. For very small shops, Defender + freshclam + centralized log storage gives good coverage without major licensing cost.

Risks of not implementing and compliance pitfalls

Failing to keep definitions current or skip periodic scans increases risk of persistent infections, lateral movement, data exfiltration, and loss of CUI. From a compliance perspective, lack of centralized evidence (logs, update timestamps, scan reports) often causes failed assessments even if agents are installed. Common pitfalls include: agents installed but disabled real-time protection, definition updates blocked by firewall/proxy, or scan exclusions that inadvertently omit critical directories. Verify firewall/proxy allows update endpoints and validate by collecting timestamps from multiple hosts.

Best practices and compliance tips

1) Enforce real-time protection and automatic updates by policy (not by user choice). 2) Define a scan cadence: daily quick scans, weekly full scans, and an immediate on-demand scan after suspicious events. 3) Centralize logging and retain proof of updates and scans for the timeframe required by your Compliance Framework. 4) Maintain an exclusions policy — document any exclusions, who approved them, and why. 5) Periodically test: simulate a benign test file (EICAR) to validate that updates and scans detect threats and that SIEM receives alerts. 6) For hybrid environments, use a combination of built-in security features (Defender), lightweight open-source tooling (ClamAV, Wazuh), and consider lightweight commercial EDR for real-time blocking if budget permits.

Summary: Implementing SI.L1-B.1.XV for FAR 52.204-21 / CMMC 2.0 Level 1 requires consistent, documented periodic scans and automated real-time signature/definition updates across all endpoints and servers. For small businesses, practical steps are to deploy centrally managed agents, enable real-time protection, configure hourly definition updates and daily/weekly scan schedules, centralize logs for audit, and regularly test detection and update processes — these actions reduce risk and create the artifact trail assessors require.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes