🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Guide to Configuring Endpoint Real-Time Scans for External Files: NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SI.L2-3.14.5

Practical, step-by-step guidance to configure endpoint real-time scanning of external files to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 SI.L2-3.14.5 requirements.

April 08, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, step-by-step approach for small businesses and IT teams to configure endpoint real-time scanning of external files in order to meet the Compliance Framework requirement mapped to NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 — SI.L2-3.14.5. It covers planning, technical configuration, logging and evidence collection for audits, and concrete examples for Windows and Linux endpoints and cloud/email ingestion vectors.

What SI.L2-3.14.5 requires and the risk of not implementing it

SI.L2-3.14.5 expects organizations to scan files from external sources in real time to detect malicious content before it executes or is used to exfiltrate Controlled Unclassified Information (CUI). External sources include removable media, email attachments, web downloads, file shares, and cloud storage. Failing to implement this control increases risk of ransomware, credential theft, supply-chain malware, data breaches, and loss of DIB/DoD contracts due to noncompliance. For a small business, a single successful ransomware infection can cause operational downtime and regulatory penalties.

Step 1 — Scope and planning (inventory & policy)

Start by scoping which endpoints and ingestion points handle CUI or are high-risk: employee laptops, file servers, contractor systems, web gateways, mail servers, OneDrive/SharePoint, and any jump hosts. Document a policy that defines what “external files” mean for your environment, acceptable scanning latency, quarantine actions, and exception handling. Define required evidence for auditors (endpoint logs, signature update history, quarantine reports, policy snapshots, and test results). A clear scope helps focus implementation and keeps the compliance evidence concise.

Step 2 — Choose and prepare your tooling

Select endpoint protection (EDR/AV) and email/gateway/cloud scanning solutions that support on-access (real-time) scanning, archive inspection, and cloud threat intelligence. For small businesses, viable choices include modern EDR/AV with cloud intelligence (e.g., Microsoft Defender for Business + Defender for Office 365, CrowdStrike, SentinelOne, Sophos, Bitdefender). Ensure the chosen solution can: (a) scan files as they are opened/created/moved, (b) inspect nested archives and common script types (.js, .ps1, .vbs), and (c) integrate logs into a central aggregator or SIEM for retention and reporting. Budget for signature/definition/cloud updates and agent deployment across your asset inventory.

Example technical configurations (Windows and Linux)

Windows (illustrative): Deploy Microsoft Defender or equivalent via Intune/GPO and enable real-time protection and archive/script scanning. From an elevated PowerShell session you can verify and set Defender real-time protection and exclusions (run as Administrator):

PowerShell examples (run in elevated shell):

Update signatures: Update-MpSignature

Enable real-time protection (if disabled): Set-MpPreference -DisableRealtimeMonitoring $false

Add an exclusion (use sparingly for performance): Add-MpPreference -ExclusionPath "C:\Path\To\Exclude"

Note: exact cmdlet parameters can vary by Defender/EDR vendor; test changes in a lab before wide rollout and document any exclusions with justification.

Linux (illustrative): Use ClamAV for signature scanning and combine with an on-write/inotify-trigger to perform near-real-time scans for removable mounts or monitored directories. Example using inotifywait (requires inotify-tools):

inotifywait -m /mnt/usb -e create -e moved_to --format '%w%f' | while read FILE; do clamscan --no-summary --infected --log=/var/log/clamav/scan.log "$FILE"; done

For production-grade Linux endpoints, consider an EDR agent that supports on-access scanning, or integrate file upload scanning in gateway/cloud connectors.

Step 3 — Configure scanning policies and tuning

Key configuration items: enable on-access scanning, scan nested archives and scripts, set file-size limits (e.g., scan up to 100 MB by default, escalate larger files to scheduled deep scans), define quarantine vs. auto-delete actions (quarantine is preferred), and set thresholds for automatic blocking. Create granular policies for different user groups—e.g., developer machines may need different exclusions than office laptops. Configure cloud-based ML scanning for zero-day protection where available. Maintain documentation of every policy change via your change-control process.

Logging, alerting, and evidence for audits

Ensure agents forward logs (detection events, quarantine actions, signature updates, agent version) to a central log store or SIEM with retention aligned to contract/audit requirements (typically 1 year or as specified). Create automated nightly reports showing: detections by endpoint, quarantines, signature update success/failure, and exceptions. Retain policy configuration snapshots and deployment manifests (agent versions, applied policies) as audit evidence. Regularly export and store sample quarantine artifacts in a secure location for incident response verification.

Small business scenarios and real-world examples

Scenario A — Office 365-only small business: Enable Defender for Office 365 Safe Attachments to sandbox email attachments; deploy Microsoft Defender for Business to all Windows endpoints via Intune; set on-access scanning and archive inspection to “on”; send events to Defender portal and export weekly detection CSVs for evidence. Scenario B — Mixed environment with removable media: Enforce policy that removable media are scanned on insert; use endpoint agent policies to block execution from removable media until a scan completes; log each insertion+scan result to a central syslog collector. Both scenarios should include a monthly simulated test (drop a benign EICAR file in a test share) and capture the detection and response as proof for auditors.

Compliance tips and best practices

1) Test before wide rollout — use a phased deployment and test exclusions. 2) Least privilege and execution controls — combine real-time scanning with hardening: AppLocker, script-blocking, and application allowlisting reduce reliance on signatures alone. 3) Keep signatures and agents up to date and automate updates. 4) Document exceptions and apply compensating controls when exclusions are necessary. 5) Train staff on handling suspected malicious files and preserve artifacts for incident response. 6) Periodically validate detection with controlled tests and include the test results in compliance artifacts.

In summary, meeting SI.L2-3.14.5 requires a combination of policy, correctly configured endpoint and gateway scanning technologies, logging for audit trails, and routine validation. For small businesses, a pragmatic path involves scoping CUI touchpoints, deploying a modern EDR/AV and email/cloud scanning stack, configuring on-access scans (including archive/script inspection), centralizing logs, and documenting everything — from policies and exceptions to test results — to prove compliance and reduce operational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes