{
  "title": "Step-by-Step Guide to Meeting FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XV: Configure Periodic System Scans and Real-Time External File Scanning",
  "date": "2026-04-04",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/step-by-step-guide-to-meeting-far-52204-21-cmmc-20-level-1-control-sil1-b1xv-configure-periodic-system-scans-and-real-time-external-file-scanning.jpg",
  "content": {
    "full_html": "<p>This guide walks through practical, actionable steps for small businesses and compliance teams to configure periodic system scans and real-time external file scanning required by FAR 52.204-21 and CMMC 2.0 Level 1, Control SI.L1-B.1.XV — covering technical configuration, testing, logging, and audit-ready documentation so you can implement, validate, and maintain the capability with limited resources.</p>\n\n<h2>Why this control matters and the compliance objective</h2>\n<p>The objective of SI.L1-B.1.XV is to ensure systems are regularly scanned for known malicious content and that files originating from external sources (email attachments, downloads, removable media, cloud shares) are scanned in real time to prevent malware from entering your environment. For a small business this reduces the risk of ransomware, credential theft, and data exfiltration while providing demonstrable controls for FAR/CMMC audits.</p>\n\n<h2>Step-by-step implementation plan (practical)</h2>\n<p>1) Inventory: Start with an asset inventory (workstations, servers, cloud endpoints, mobile, VMs). 2) Select solution(s): pick an AV/EDR that supports on-access (real-time) scanning and scheduled scans — examples: Microsoft Defender for Business (Windows), CrowdStrike/Falcon (EDR), Sophos, or open-source combos (ClamAV for Linux + host-based detection). 3) Configure real-time scanning: enable on-access scanning for file create/write/execute events and specifically for external sources (removable media, SMB mounts, downloads). 4) Configure periodic scans: set full-system scans weekly and quick/differential scans daily; stagger schedules to avoid simultaneous CPU spikes. 5) Update pipeline: ensure signature/engine updates happen at least daily and are monitored. 6) Logging and alerting: send detections and quarantine events to a central log (SIEM, cloud analytics, or even a managed logging mailbox). 7) Test and document: validate with EICAR and documented test runs, and maintain an exceptions register for allowed exclusions.</p>\n\n<h3>Technical configuration details and examples</h3>\n<p>On Windows, use Defender/Group Policy/Intune to enable real-time protection and scheduled scans. Example PowerShell commands (run as admin) to ensure real-time protections are enabled and to start a full scan: <code>Set-MpPreference -DisableRealtimeMonitoring $false</code> and <code>Start-MpScan -ScanType FullScan</code>. Use <code>Add-MpPreference -ExclusionPath &quot;C:\\Path\\To\\Exempt&quot;</code> only with documented justification. For CPU control use <code>Set-MpPreference -ScanAvgCPULoadFactor 25</code> to limit system impact during scheduled scans. For policy-based deployment, configure \"Microsoft Defender Antivirus\" settings in Intune/Group Policy to apply these at scale.</p>\n\n<h3>Linux, macOS, mail and cloud scanning</h3>\n<p>On Linux servers you can use ClamAV with cron for scheduled scans and freshclam for definition updates. Example cron for weekly full scan: <code>0 3 * * 0 clamscan -r -i / --exclude-dir=/proc --log=/var/log/clamav/weekly-scan.log</code>. For email and cloud attachments, deploy gateway or cloud-native scanning (Microsoft Defender for Office 365, Mimecast, Proofpoint) or integrate a file-scan step into your file-receipt pipeline (e.g., Lambda function that scans S3 uploads with VirusTotal/APIs or an AV engine). On macOS, manage AV via MDM (Jamf/Intune) and ensure on-access scanning is enabled; consider using an EDR like CrowdStrike for minimal user disruption and strong telemetry.</p>\n\n<h2>Small-business scenarios and cost-effective approaches</h2>\n<p>Scenario A – Small engineering firm (20 users): Use Microsoft 365 Business Premium + Defender for Business. Configure Defender via Intune: enable real-time protection, schedule weekly full scans at off-hours, enable cloud-delivered protection and automatic sample submission, and route Windows Event logs to Azure Sentinel for central alerts. Scenario B – Startup with mixed Linux web servers: run ClamAV for file ingress points (upload forms), enable inotify-based on-write scanning for upload directories, and run nightly full scans; ship /var/log/clamav to your logging endpoint. Scenario C – Contractor who receives files on USB: disable autorun, enforce BitLocker and configure NTFS deny for executables on removable media while allowing real-time scanning by Defender when media is mounted.</p>\n\n<h2>Logging, alerting, and audit evidence</h2>\n<p>Configure detection events to forward to your SIEM or a managed logging service. Capture the following for audits: (a) scan schedules and policies (policy export or screenshots), (b) recent scan logs with timestamps and outcomes, (c) signature/engine update history, (d) incident/quarantine logs and resolution notes, and (e) test results (EICAR detection or documented simulated infections). Keep logs and evidence retention aligned to contract requirements — a practical minimum is 90 days for operational logs and 1 year for audit evidence unless FAR/CMMC requires longer.</p>\n\n<h2>Compliance tips, best practices and risk of non-implementation</h2>\n<p>Best practices: keep signature updates automated and monitored, enforce a change-control process for exclusions (maintain an exception register), perform monthly verification scans, tune detection rules to reduce false positives, and train users on safe handling of external files. Use EICAR and staged test files to validate settings after configuration changes. Risks of not implementing include increased chance of malware outbreaks (ransomware, data theft), longer incident response times, loss of DoD contracts or FCI/CUI handling privileges, reputational damage, and possible contractual penalties under FAR 52.204-21.</p>\n\n<p>In summary, meeting SI.L1-B.1.XV is practical for small organizations if you follow a repeatable plan: inventory assets, choose appropriate AV/EDR and gateway/cloud scanning tools, enable on-access scanning for external files, schedule regular full and differential scans, centralize logs and alerts, test detections regularly, and document everything for audit. With these steps you can both reduce operational risk and produce the evidence auditors expect under the Compliance Framework.</p>",
    "plain_text": "This guide walks through practical, actionable steps for small businesses and compliance teams to configure periodic system scans and real-time external file scanning required by FAR 52.204-21 and CMMC 2.0 Level 1, Control SI.L1-B.1.XV — covering technical configuration, testing, logging, and audit-ready documentation so you can implement, validate, and maintain the capability with limited resources.\n\nWhy this control matters and the compliance objective\nThe objective of SI.L1-B.1.XV is to ensure systems are regularly scanned for known malicious content and that files originating from external sources (email attachments, downloads, removable media, cloud shares) are scanned in real time to prevent malware from entering your environment. For a small business this reduces the risk of ransomware, credential theft, and data exfiltration while providing demonstrable controls for FAR/CMMC audits.\n\nStep-by-step implementation plan (practical)\n1) Inventory: Start with an asset inventory (workstations, servers, cloud endpoints, mobile, VMs). 2) Select solution(s): pick an AV/EDR that supports on-access (real-time) scanning and scheduled scans — examples: Microsoft Defender for Business (Windows), CrowdStrike/Falcon (EDR), Sophos, or open-source combos (ClamAV for Linux + host-based detection). 3) Configure real-time scanning: enable on-access scanning for file create/write/execute events and specifically for external sources (removable media, SMB mounts, downloads). 4) Configure periodic scans: set full-system scans weekly and quick/differential scans daily; stagger schedules to avoid simultaneous CPU spikes. 5) Update pipeline: ensure signature/engine updates happen at least daily and are monitored. 6) Logging and alerting: send detections and quarantine events to a central log (SIEM, cloud analytics, or even a managed logging mailbox). 7) Test and document: validate with EICAR and documented test runs, and maintain an exceptions register for allowed exclusions.\n\nTechnical configuration details and examples\nOn Windows, use Defender/Group Policy/Intune to enable real-time protection and scheduled scans. Example PowerShell commands (run as admin) to ensure real-time protections are enabled and to start a full scan: Set-MpPreference -DisableRealtimeMonitoring $false and Start-MpScan -ScanType FullScan. Use Add-MpPreference -ExclusionPath &quot;C:\\Path\\To\\Exempt&quot; only with documented justification. For CPU control use Set-MpPreference -ScanAvgCPULoadFactor 25 to limit system impact during scheduled scans. For policy-based deployment, configure \"Microsoft Defender Antivirus\" settings in Intune/Group Policy to apply these at scale.\n\nLinux, macOS, mail and cloud scanning\nOn Linux servers you can use ClamAV with cron for scheduled scans and freshclam for definition updates. Example cron for weekly full scan: 0 3 * * 0 clamscan -r -i / --exclude-dir=/proc --log=/var/log/clamav/weekly-scan.log. For email and cloud attachments, deploy gateway or cloud-native scanning (Microsoft Defender for Office 365, Mimecast, Proofpoint) or integrate a file-scan step into your file-receipt pipeline (e.g., Lambda function that scans S3 uploads with VirusTotal/APIs or an AV engine). On macOS, manage AV via MDM (Jamf/Intune) and ensure on-access scanning is enabled; consider using an EDR like CrowdStrike for minimal user disruption and strong telemetry.\n\nSmall-business scenarios and cost-effective approaches\nScenario A – Small engineering firm (20 users): Use Microsoft 365 Business Premium + Defender for Business. Configure Defender via Intune: enable real-time protection, schedule weekly full scans at off-hours, enable cloud-delivered protection and automatic sample submission, and route Windows Event logs to Azure Sentinel for central alerts. Scenario B – Startup with mixed Linux web servers: run ClamAV for file ingress points (upload forms), enable inotify-based on-write scanning for upload directories, and run nightly full scans; ship /var/log/clamav to your logging endpoint. Scenario C – Contractor who receives files on USB: disable autorun, enforce BitLocker and configure NTFS deny for executables on removable media while allowing real-time scanning by Defender when media is mounted.\n\nLogging, alerting, and audit evidence\nConfigure detection events to forward to your SIEM or a managed logging service. Capture the following for audits: (a) scan schedules and policies (policy export or screenshots), (b) recent scan logs with timestamps and outcomes, (c) signature/engine update history, (d) incident/quarantine logs and resolution notes, and (e) test results (EICAR detection or documented simulated infections). Keep logs and evidence retention aligned to contract requirements — a practical minimum is 90 days for operational logs and 1 year for audit evidence unless FAR/CMMC requires longer.\n\nCompliance tips, best practices and risk of non-implementation\nBest practices: keep signature updates automated and monitored, enforce a change-control process for exclusions (maintain an exception register), perform monthly verification scans, tune detection rules to reduce false positives, and train users on safe handling of external files. Use EICAR and staged test files to validate settings after configuration changes. Risks of not implementing include increased chance of malware outbreaks (ransomware, data theft), longer incident response times, loss of DoD contracts or FCI/CUI handling privileges, reputational damage, and possible contractual penalties under FAR 52.204-21.\n\nIn summary, meeting SI.L1-B.1.XV is practical for small organizations if you follow a repeatable plan: inventory assets, choose appropriate AV/EDR and gateway/cloud scanning tools, enable on-access scanning for external files, schedule regular full and differential scans, centralize logs and alerts, test detections regularly, and document everything for audit. With these steps you can both reduce operational risk and produce the evidence auditors expect under the Compliance Framework."
  },
  "metadata": {
    "description": "Practical, step-by-step guidance to implement periodic system scans and real-time external file scanning to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XV requirements for small businesses.",
    "permalink": "/step-by-step-guide-to-meeting-far-52204-21-cmmc-20-level-1-control-sil1-b1xv-configure-periodic-system-scans-and-real-time-external-file-scanning.json",
    "categories": [],
    "tags": []
  }
}