This post provides a practical, step-by-step approach for small businesses and IT teams to configure endpoint real-time scanning of external files in order to meet the Compliance Framework requirement mapped to NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 — SI.L2-3.14.5. It covers planning, technical configuration, logging and evidence collection for audits, and concrete examples for Windows and Linux endpoints and cloud/email ingestion vectors.
What SI.L2-3.14.5 requires and the risk of not implementing it
SI.L2-3.14.5 expects organizations to scan files from external sources in real time to detect malicious content before it executes or is used to exfiltrate Controlled Unclassified Information (CUI). External sources include removable media, email attachments, web downloads, file shares, and cloud storage. Failing to implement this control increases risk of ransomware, credential theft, supply-chain malware, data breaches, and loss of DIB/DoD contracts due to noncompliance. For a small business, a single successful ransomware infection can cause operational downtime and regulatory penalties.
Step 1 — Scope and planning (inventory & policy)
Start by scoping which endpoints and ingestion points handle CUI or are high-risk: employee laptops, file servers, contractor systems, web gateways, mail servers, OneDrive/SharePoint, and any jump hosts. Document a policy that defines what “external files” mean for your environment, acceptable scanning latency, quarantine actions, and exception handling. Define required evidence for auditors (endpoint logs, signature update history, quarantine reports, policy snapshots, and test results). A clear scope helps focus implementation and keeps the compliance evidence concise.
Step 2 — Choose and prepare your tooling
Select endpoint protection (EDR/AV) and email/gateway/cloud scanning solutions that support on-access (real-time) scanning, archive inspection, and cloud threat intelligence. For small businesses, viable choices include modern EDR/AV with cloud intelligence (e.g., Microsoft Defender for Business + Defender for Office 365, CrowdStrike, SentinelOne, Sophos, Bitdefender). Ensure the chosen solution can: (a) scan files as they are opened/created/moved, (b) inspect nested archives and common script types (.js, .ps1, .vbs), and (c) integrate logs into a central aggregator or SIEM for retention and reporting. Budget for signature/definition/cloud updates and agent deployment across your asset inventory.
Example technical configurations (Windows and Linux)
Windows (illustrative): Deploy Microsoft Defender or equivalent via Intune/GPO and enable real-time protection and archive/script scanning. From an elevated PowerShell session you can verify and set Defender real-time protection and exclusions (run as Administrator):
PowerShell examples (run in elevated shell):
Update signatures: Update-MpSignature
Enable real-time protection (if disabled): Set-MpPreference -DisableRealtimeMonitoring $false
Add an exclusion (use sparingly for performance): Add-MpPreference -ExclusionPath "C:\Path\To\Exclude"
Note: exact cmdlet parameters can vary by Defender/EDR vendor; test changes in a lab before wide rollout and document any exclusions with justification.
Linux (illustrative): Use ClamAV for signature scanning and combine with an on-write/inotify-trigger to perform near-real-time scans for removable mounts or monitored directories. Example using inotifywait (requires inotify-tools):
inotifywait -m /mnt/usb -e create -e moved_to --format '%w%f' | while read FILE; do clamscan --no-summary --infected --log=/var/log/clamav/scan.log "$FILE"; done
For production-grade Linux endpoints, consider an EDR agent that supports on-access scanning, or integrate file upload scanning in gateway/cloud connectors.
Step 3 — Configure scanning policies and tuning
Key configuration items: enable on-access scanning, scan nested archives and scripts, set file-size limits (e.g., scan up to 100 MB by default, escalate larger files to scheduled deep scans), define quarantine vs. auto-delete actions (quarantine is preferred), and set thresholds for automatic blocking. Create granular policies for different user groups—e.g., developer machines may need different exclusions than office laptops. Configure cloud-based ML scanning for zero-day protection where available. Maintain documentation of every policy change via your change-control process.
Logging, alerting, and evidence for audits
Ensure agents forward logs (detection events, quarantine actions, signature updates, agent version) to a central log store or SIEM with retention aligned to contract/audit requirements (typically 1 year or as specified). Create automated nightly reports showing: detections by endpoint, quarantines, signature update success/failure, and exceptions. Retain policy configuration snapshots and deployment manifests (agent versions, applied policies) as audit evidence. Regularly export and store sample quarantine artifacts in a secure location for incident response verification.
Small business scenarios and real-world examples
Scenario A — Office 365-only small business: Enable Defender for Office 365 Safe Attachments to sandbox email attachments; deploy Microsoft Defender for Business to all Windows endpoints via Intune; set on-access scanning and archive inspection to “on”; send events to Defender portal and export weekly detection CSVs for evidence. Scenario B — Mixed environment with removable media: Enforce policy that removable media are scanned on insert; use endpoint agent policies to block execution from removable media until a scan completes; log each insertion+scan result to a central syslog collector. Both scenarios should include a monthly simulated test (drop a benign EICAR file in a test share) and capture the detection and response as proof for auditors.
Compliance tips and best practices
1) Test before wide rollout — use a phased deployment and test exclusions. 2) Least privilege and execution controls — combine real-time scanning with hardening: AppLocker, script-blocking, and application allowlisting reduce reliance on signatures alone. 3) Keep signatures and agents up to date and automate updates. 4) Document exceptions and apply compensating controls when exclusions are necessary. 5) Train staff on handling suspected malicious files and preserve artifacts for incident response. 6) Periodically validate detection with controlled tests and include the test results in compliance artifacts.
In summary, meeting SI.L2-3.14.5 requires a combination of policy, correctly configured endpoint and gateway scanning technologies, logging for audit trails, and routine validation. For small businesses, a pragmatic path involves scoping CUI touchpoints, deploying a modern EDR/AV and email/cloud scanning stack, configuring on-access scans (including archive/script inspection), centralizing logs, and documenting everything — from policies and exceptions to test results — to prove compliance and reduce operational risk.