🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Endpoint and Removable Media Scanning to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.4: Automating Malicious Code Checks

Step-by-step guidance for configuring automated endpoint and removable-media malware scanning that satisfies MA.L2-3.7.4 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2, with practical small-business examples and implementation details.

•
April 13, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

MA.L2-3.7.4 requires organizations to automate malicious-code checks on managed devices and removable media; this post shows how small and mid-sized organizations can configure endpoint protection, removable-media scanning, logging, and automation so that those checks are effective, auditable, and aligned with the Compliance Framework.

What the control requires in practice

At its core, MA.L2-3.7.4 expects continuous and automated capabilities that detect and respond to malicious code on endpoints and on removable media (USB, external HDDs, SD cards, etc.). That includes real-time scanning, scans on device mount or file-write, scheduled full scans, timely signature and rule updates, quarantine/remediation actions, and robust logging to provide evidence for audits. For Compliance Framework alignment, combine technical controls with policies for device usage, exceptions, and proof of monitoring.

Implementation components and recommended configurations

Implement these components: (1) centrally managed Endpoint Protection/EDR agents with real-time protection and on-access scans, (2) removable-media scan-on-mount and scan-on-execute rules, (3) automated signature and rule updates (anti-malware, heuristics, YARA/IOCs), (4) quarantine and automated remediation actions, and (5) centralized logging and alerting (SIEM / EDR console). Technical recommendations: enable real-time protection, enable scanning of archives and nested files, require scan-on-write or on-execute for directories used for downloads and removable mounts, and configure automatic signature updates at least every 4–8 hours. Use allowlists (hash-based) only when necessary and keep exclusions tightly scoped and documented.

Example vendor-specific settings (illustrative)

Microsoft Defender for Endpoint: enable real-time protection and removable drive scanning (Set-MpPreference -DisableRemovableDriveScanning $false), set cloud-delivery & automatic remediation, and monitor the "Microsoft-Windows-Windows Defender/Operational" event channel and the Defender console for detections. For Linux hosts, run clamd/freshclam with a file-system watcher (inotify/fanotify) that triggers clamscan on newly mounted volumes; schedule daily full scans with cron and ensure freshclam runs every hour. For macOS, deploy an EDR/AV via Jamf and configure "scan on mount" checks and quarantine via the EDR policy. In all cases, deploy agents through a central console and roll out configuration via policy to prevent configuration drift.

Removable media-specific controls and practical steps

Removable media is a high-risk vector—implement device control and scanning together. Steps: disable autorun/autoplay at the OS level; enforce bitlocker/filevault (or equivalent) encryption for permitted removable devices; implement a device control policy that restricts which USB classes or serials can mount; on allowed devices, enforce automatic scan-on-mount and deny execution of unscanned binaries by default. Maintain an inventory of approved removable devices (vendor/serial hash). For small businesses with limited staff, use built-in OS controls (GPO for Windows: disable autoplay and deploy Defender settings) combined with a low-cost EDR/AV with device control features to centralize enforcement.

Small-business scenarios and real-world examples

Scenario A: 40-seat engineering firm with occasional contractor USB drops. Deploy a cloud-managed EDR (e.g., Defender, CrowdStrike, SentinelOne) to all endpoints, enforce device-control policies that allow only company-issued USBs (identified by serial number or vendor ID), and configure auto-scan on mount with quarantine and automatic removal of network shares on detection. Scenario B: Manufacturing shop using USB drives for offline PLC updates. Create a vetted process: a staging PC with an EDR that performs a full scan and hash-whitelist the update file, record the hash in change management, and log the device and user in a change ticket. These practical processes reduce false positives and produce audit evidence required by Compliance Framework.

Logging, evidence, and automation for compliance

Ensure every detection produces auditable artifacts: event logs, EDR alerts with timestamps, files quarantined (or hashes taken), user and host context, and remediation actions taken. Forward these to your SIEM or centralized logging (e.g., Elastic, Splunk, Azure Sentinel) and create retention policies appropriate to your compliance needs (typically 1–3 years depending on organizational policy). Automate playbooks for common detection types: isolate host, collect forensic snapshot, quarantine file, notify incident response, and open a ticket. SOAR tools or built-in EDR automation can perform these steps and generate an evidence trail for an auditor.

Risks of not implementing automated scanning

Without automated endpoint and removable media scanning, organizations face increased risk of ransomware and data exfiltration, loss of Controlled Unclassified Information (CUI), and supply-chain compromise. For contractors and small businesses holding or processing CUI, failing MA.L2-3.7.4 can result in contract loss, remediation costs, and reputational damage. Practically, missing automated checks means delays in detection, greater lateral movement by attackers, and fewer forensic artifacts—making incident response slower and less effective.

Summary — implement centrally managed EDR/AV with scan-on-mount for removable media, enforce device control and encryption, automate signature updates and remediation, collect and retain detection logs, and document your policies and exceptions. Start with a pilot, harden policies (minimal exclusions), and iterate with routine testing; doing so will satisfy MA.L2-3.7.4 in a practical, auditable way that fits small-business constraints while reducing real operational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes