🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to build a step-by-step update process for antivirus and EDR to satisfy FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIV

Practical, step-by-step guidance to design and operate an antivirus and EDR update process that meets FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIV for small businesses.

•
April 02, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Keeping antivirus (AV) and endpoint detection and response (EDR) agents up to date is a concrete, testable requirement under FAR 52.204-21 and maps directly to CMMC 2.0 Level 1 control SI.L1-B.1.XIV; this post gives a practical, small-business-friendly, step-by-step process you can implement today to meet those requirements and produce the evidence auditors will expect.

Key objectives and mapping to Compliance Framework

Your primary objective is to ensure AV/EDR signature and engine updates, plus agent/software updates, are applied in a timely, auditable manner so endpoints remain protected against known threats. FAR 52.204-21 requires basic safeguards for covered contractor information systems; CMMC 2.0 Level 1 SI.L1-B.1.XIV focuses on maintaining malicious code protection. In practice that means documenting policies, enforcing automatic updates or timely manual updates, monitoring update status, and retaining artifacts (logs, reports, policies) to demonstrate compliance.

Step-by-step update process (high level)

Design the process as a repeatable operation with owners, SLAs, technical controls, testing, rollback plans, monitoring, and evidence collection. Keep it lightweight for a small business (10–250 seats) but rigorous enough to show auditors: define roles, establish update windows and thresholds, automate where possible, and produce weekly/monthly status reports.

Steps 1–2: Inventory endpoints and publish an update policy

Start with a definitive inventory: list each endpoint by asset tag/hostname, OS, AV/EDR vendor and agent version, management group (e.g., prod/test), and last-seen timestamp. Use Intune/SCCM, Jamf, or a simple spreadsheet exported from your EDR console. Publish a written update policy stating: update frequency (e.g., signatures: daily & real-time; engine/agent updates: within 7 days of release), SLA for critical updates (apply within 24 hours), exceptions process, and evidence retention period (e.g., 180 days). Assign an owner (IT Manager or external MSP) responsible for process execution and evidence collection.

Steps 3–4: Test updates and stage deployments

Never push major engine or agent updates to all endpoints at once. Create a "canary" group (5–10 machines) and a pilot group (10–20%) for staged rollouts. For signature updates and minor auto-updates, enable automatic real-time updates in the EDR/AV product. For larger agent updates, roll through canary → pilot → broad deployment and document test results (functionality checks, performance metrics, any blocker logs). Example: configure CrowdStrike or SentinelOne console to auto-approve definitions and to stage agent updates by tags or cohorts.

Steps 5–6: Deploy, verify, monitor, and retain evidence

Deploy with automation when possible. For Windows Defender environment checks use PowerShell: Get-MpComputerStatus | Select AMEngineVersion, AMProductVersion, AntivirusSignatureLastUpdated. For Linux endpoints, query package versions (apt-cache policy package or rpm -qa | grep ). Configure the EDR management console to report agent health and signature age, set alerts for devices with signatures older than 24 hours, and feed those alerts into your ticketing system. Save weekly exports: device update status, agent versions, and a signed runbook of actions taken. Retain logs and reports per your policy as the primary audit evidence.</p>

Technical implementation details and small-business examples

Small businesses can implement this without enterprise tooling. Example configurations: use Microsoft Intune + Windows Defender for Windows-centric shops (enable cloud-delivered protection, set signature update check to once per hour, and enable tamper protection); use Jamf + built-in AV or a lightweight EDR like CrowdStrike Falcon for Macs; for Linux servers use a package-management cron (apt/yum) plus a lightweight EDR agent and a single centralized logging host. Example commands and checks: Windows PowerShell Get-MpComputerStatus for Defender; for CrowdStrike check agent health via API: GET /devices/queries/devices/v1 and correlate agent_version and update_status fields; for macOS use jamf recon or jamf pro API to report installed EDR versions. Secure update channels: require TLS, enforce server certificate validation, and whitelist vendor update domains in any proxy or firewall used for outbound updates.

Compliance tips, evidence, and operational best practices

Keep these practical tips: 1) Set a measurable SLA (e.g., signatures must be <= 24 hours old; major agent patches deployed to 95% of endpoints within 7 days). 2) Automate reporting—schedule daily exports from the EDR console and store them in a write-once audit folder. 3) Create a runbook for exceptions (interference with critical apps) that requires approval and logs mitigations. 4) Integrate update alerts into your ticketing system so a closed ticket is evidence of remediation. 5) Periodically validate with sampling—pick 10 random endpoints monthly and capture their AV/EDR status as proof. These artifacts map directly to what auditors review for FAR and CMMC evidence requirements.

Risks of not implementing the process

Failure to maintain timely AV/EDR updates increases risk of successful malware, ransomware, and supply-chain attacks—compromises that can lead to data loss, loss of contracts, regulatory fines, and reputational damage. From a compliance standpoint, missing both policy and evidence can result in audit findings, corrective action plans, contract ineligibility, or termination. Operationally, untested updates deployed widely without staging can cause outages; conversely, no rollback/exception plan can leave critical systems offline for extended periods during a bad update.

In summary, build a lightweight but auditable process: inventory assets, publish SLA-driven policies, stage and test updates, automate deployment and monitoring, integrate alerts into ticketing, and retain evidence. For small businesses this is achievable with built-in platform tools (Intune, Jamf, SCCM) or with affordable EDR consoles—doing so will meet the intent and the testability of FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIV while materially reducing your malware risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes