🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Antivirus, Web Filtering, and EDR to Satisfy FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII (Code 556)

Step-by-step guidance to configure antivirus, EDR, and web filtering to meet FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIII (Code 556) for small businesses.

•
March 31, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains pragmatic, auditable steps to configure antivirus, web filtering, and endpoint detection and response (EDR) to meet FAR 52.204-21 and CMMC 2.0 Level 1 control SI.L1-B.1.XIII (Code 556) under the Compliance Framework, focusing on real-world settings for small businesses and the documentation you’ll need for an assessor.

Implementation overview and required mapping

Start by mapping the control to your Compliance Framework artifact: SI.L1-B.1.XIII (Code 556) requires preventing, detecting, and responding to malicious code and unauthorized internet content—this is satisfied by layered controls (antivirus/endpoint protection, EDR, and web filtering) plus documented baselines and evidence of enforcement. Actionable first steps: inventory endpoints (workstations, servers, laptops), list internet egress points, and select solutions that support centralized policy, logging, and exportable reports (examples: Microsoft Defender for Endpoint + Intune + Azure DNS filtering, CrowdStrike + Cisco Umbrella, or SentinelOne + Proxy/Firewall URL filtering).

Antivirus / endpoint protection configuration (practical details)

Configure antivirus with these baseline settings: real-time on-access scanning enabled; signature and engine updates set to automatic (at least every 24 hours); scheduled full system scans weekly and quick scans daily; heuristic/behavioral scanning enabled; automatic quarantine for high-confidence detections; and tamper protection where supported. For Windows-heavy small businesses, a common low-cost baseline is Microsoft Defender with centralized policies via Intune: enable Cloud-Delivered Protection, Real-Time Protection, Controlled Folder Access (if compatible), and block execution from commonly abused directories (e.g., %TEMP%, AppData\Local\Temp). Document the policy names and export policy JSON/policy assignment reports as evidence.

EDR configuration (technical specifics and response actions)

EDR must provide richer telemetry and automated response. Configure the EDR agent on all managed endpoints (target 100% coverage for regulated endpoints), set telemetry to “full” or “detailed” (not minimal), enable prevention mode (if available) to block known bad behaviors, and enable automatic containment (network isolation) on high-fidelity alerts. Key settings: sensor auto-update, tamper protection, enable automated submission of suspicious files (with privacy considerations), and enforce least-privilege for the EDR management console (role-based access). Configure alerting thresholds and a triage playbook: e.g., high-severity malware triggers immediate isolation, medium-severity triggers quarantine + analyst review within 4 hours. Retain EDR logs for at least 90 days (adjust per contract requirements) and export incident reports as artifacts for auditors.

Web filtering and network controls (DNS/HTTP(S) specifics)

Web filtering should block malicious and high-risk categories (malware, phishing, command-and-control, suspicious downloads) and be enforced at multiple layers: DNS filtering (Cloud DNS, Cisco Umbrella, or Pi-hole with blocklists), perimeter proxy/firewall URL filtering, and browser-level policy. For small businesses without a full proxy, a DNS filter plus endpoint browser controls is acceptable—ensure HTTPS inspection policy addresses privacy and performance, and document exceptions. Practical settings: block executable downloads from untrusted sites, block or require review for “file share” categories, apply strict rules for remote workers (enforce VPN split-tunnel policies or use Always On VPN), and maintain a documented allowlist for essential SaaS endpoints. Log DNS requests and web events and store them centrally for correlation with EDR alerts.

Operationalization: deployment, logging, testing, and evidence

Operationalize by creating a deployment playbook: (1) pilot on 5–10 endpoints, (2) tune policies to reduce false positives, (3) deploy to production in waves, and (4) verify via endpoint inventory and EDR console. Collect artifacts for compliance: export policy configuration files, agent deployment reports, console screenshots showing policy assignment, quarantine logs, and sample incident tickets. Integrate logs into a central collector or SIEM (even a cloud-based syslog sink) and retain logs per policy. Test effectiveness monthly: use EICAR for antivirus detection (in safe lab), use URL category test pages, and run tabletop incident response for one medium/high detection to demonstrate containment and remediation.

Small-business examples: (A) A 25-seat design agency uses Microsoft 365 Business Premium + Defender: they enforce Defender policies via Intune, use Azure DNS filtering to block known malicious categories, and configure Defender for Endpoint to isolate endpoints automatically on confirmed ransomware signatures. Evidence: Intune device compliance reports, Defender incident exports, and Azure DNS query logs. (B) A 12-person consultancy uses a managed SOC partner: the partner deploys CrowdStrike Falcon agents, configures Umbrella DNS filtering, forwards alerts to the MSP’s SIEM, and provides monthly reports and a playbook that the client stores in their compliance binder.

Risks of not implementing these configurations include successful phishing/malware infections leading to data exfiltration or lateral movement, loss of DoD contracts for FAR noncompliance, reputational damage, and expensive incident response. Best practices: enforce tamper protection and least privilege, document baselines and change control, establish an incident playbook with SLAs, schedule monthly review of console alerts, and include awareness training so users understand web filtering blocks and safe behavior. For auditors, provide clear mappings from policy artifacts to the Compliance Framework control—annotate exported policies with the control ID and include dates of deployment and tests.

Summary: to satisfy FAR 52.204-21 / CMMC 2.0 Level 1 SI.L1-B.1.XIII (Code 556) you need layered, centrally-managed antivirus, EDR, and web filtering with documented baselines, automated updates, full endpoint coverage, logging/retention, and regular testing; for small businesses this is achievable using built-in platform tools (Microsoft Defender/Intune + DNS filtering) or cost-effective managed services—capture configuration exports, logs, and test evidence, and maintain an incident playbook and change log to demonstrate continuous compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes