🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a Patch Management Checklist to Update Malicious Code Protection (AV/EDR) — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIV

Step-by-step guidance to build a practical patch-management checklist that ensures AV/EDR signature and agent updates to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements.

March 26, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, auditable patch-management checklist to keep malicious-code protection (antivirus/EDR) current and demonstrates how small organizations can meet the spirit of FAR 52.204-21 and CMMC 2.0 Level 1 Control SI.L1-B.1.XIV by operationalizing signature, detection-rule, and agent updates.

Understanding the requirement and scope

At a high level, the control requires you to keep malicious code protection effective and up to date. That covers three things: (1) signature/definition updates and YARA/IOC rule sets used by AV/EDR engines; (2) EDR/AV agent and engine version updates (software/firmware); and (3) configuration/behavioral telemetry rules that drive detections. For Compliance Framework mapping, your evidence should show a repeatable process that schedules, tests, deploys, and documents those updates for all systems that process Controlled Unclassified Information (CUI) or support covered contracts under FAR 52.204-21.

Patch management checklist (step-by-step)

Use the following checklist as a baseline; adapt timing and tools to your environment. Each bullet is an actionable item you should be able to demonstrate with logs, reports, or screenshots during an audit.

  • Inventory endpoints and agents: produce an inventory of OS versions, EDR/AV agent names and versions, and platform types (Windows, macOS, Linux, mobile). Example: CSV from MDM/SCCM listing hostname, OS, AV product, agent version, last-definition update.
  • Define update cadence: signatures/definitions = daily (or more frequent); agent software/engine = monthly with emergency (out-of-band) patching for critical fixes.
  • Test updates before broad rollout: maintain a small staging group (5–10 endpoints) representing typical configurations; verify no false positives or operational issues for 48–72 hours prior to full deployment.
  • Use centralized management: configure vendor console (e.g., Defender for Business/Endpoint, CrowdStrike Falcon, SentinelOne, Bitdefender GravityZone) to enforce auto-updates and report status centrally.
  • Implement change control & rollback: log planned update windows, approver, and rollback steps; keep agent installers and previous versions available for rollback if needed.
  • Verify update integrity: require cryptographic signature verification from vendors; sample-check binaries and definition files (e.g., verify SHA256 or vendor-supplied signature).
  • Monitor post-deployment: ingest agent/definition update events into SIEM or EDR console; set alerts for endpoints that miss updates for >24 hours.
  • Document and retain evidence: export daily/weekly update status reports, staging test results, change tickets, and exception approvals for 6–12 months (or as contractually required).

Implementation details and technical examples

Practical technical tasks small shops can run today: on Windows, automate verification using PowerShell—Get-MpComputerStatus | Select-Object ComputerName, AMProductVersion, AntivirusSignatureVersion—to show Defender engine and definition versions. With Microsoft Intune or WSUS/SCCM you can create compliance baselines and report noncompliant endpoints. For Linux, a simple script can query package versions (dpkg -l | grep "edr" or rpm -qa | grep -i falcon) and push results to a central log collector. For cloud-managed EDR (CrowdStrike, SentinelOne), schedule a weekly "Agent Health" report and retain the CSV for audit evidence.

Small-business scenarios and real-world examples

Example A — 25-person consultancy: Using Defender for Business + Intune, the IT lead configures daily definition auto-updates and a monthly agent upgrade policy; a 5-machine staging group is created in Intune. The owner documents the Intune assignment, exports the "Device compliance" report weekly, and attaches a short testing sign-off from the staging group in the change ticket. Example B — 12-seat manufacturer: Uses a SaaS EDR (SentinelOne). The admin subscribes to automatic signature pushes, creates a Slack alert for any endpoint that fails to update within 12 hours, and keeps a spreadsheet of agent versions and last-update dates tied to each machine's business function.

Evidence for compliance and audit readiness

Auditors will expect easily produced artifacts: (1) endpoint inventory export with agent versions; (2) scheduled-update policies screenshots; (3) staging test plan and results; (4) change record/approval for monthly updates; (5) exception authorizations for devices that cannot be updated and compensating controls (e.g., network isolation). Keep logs and reports in a folder linked to the contract number so you can produce them within a reasonable timeframe.

Risk of not implementing the requirement

Failure to keep AV/EDR current increases the risk of undetected malware, ransomware pivots, and data exfiltration. For contractors handling CUI, gaps can lead to contract noncompliance, lost business, and regulatory scrutiny. Operationally, outdated agents can introduce blind spots where lateral movement occurs undetected; they may also be incompatible with newer OS updates, creating system instability. From a practical threat perspective, signature-less or unpatched engines are the simplest path for commodity malware to persist on systems.

Tips and best practices

Use defense-in-depth: combine signature updates with behavioral EDR detections and threat intelligence feeds. Automate reporting and alerts into a single dashboard so a missed update triggers a ticket. Keep vendor contact and emergency patch procedures documented for zero-day pushes. Maintain a small "golden image" for critical workstations so you can quickly rebuild in case of agent corruption. Finally, train at least two staff members on your EDR console to avoid single-person operational bottlenecks.

In summary, build a repeatable, documented checklist that inventories endpoints, enforces daily definition updates, tests agent upgrades in staging, centralizes management and monitoring, and retains update evidence. Small organizations can meet FAR 52.204-21 and CMMC Level 1 expectations by implementing the checklist items above, producing the artifacts auditors expect, and treating AV/EDR updates as a routine but prioritized part of their patch-management program.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes