This guide explains how to implement malicious code protection across endpoints and servers to meet FAR 52.204-21 and CMMC 2.0 Level 1 (Control SI.L1-B.1.XIII) requirements, with practical, step-by-step actions, small-business examples, and technical configuration notes you can apply today.
Why this control matters for Compliance Framework
FAR 52.204-21 requires basic safeguarding of covered contractor information systems, and CMMC 2.0 Level 1’s SI.L1-B.1.XIII specifically expects protection against malicious code on endpoints and servers; implementing this control reduces the risk of malware-driven data loss, ransomware, and unauthorized system access that would jeopardize CUI, contract performance, and regulatory compliance.
Step-by-step implementation
1) Scope and inventory (identify endpoints, servers, and CUI touchpoints)
First, build an accurate inventory: list all Windows and macOS desktops/laptops, Linux and Windows servers, virtual machines, mobile devices that access CUI, and any OT/embedded systems that integrate with IT. Use an asset discovery tool (e.g., Microsoft Intune/Azure AD device inventory, an open-source Nmap scan combined with OS detection, or an RMM tool for managed environments). Tag assets that process or store CUI so protection can be prioritized. Implementation notes: capture OS versions, installed agents, network segments, backup schedule, and admin accounts for each asset.
2) Select the proper protection stack for endpoints and servers
Choose products that provide signature-based anti-malware plus behavioral/EDR (endpoint detection and response) capabilities. For small businesses, cost-effective options include Microsoft Defender for Business + Defender for Endpoint, SentinelOne Core, CrowdStrike Falcon Prevent, or Sophos Intercept X; for Linux servers, consider Falco, CrowdStrike Linux sensor, or a combination of ClamAV + rkhunter/AIDE for integrity checks. Example scenario: a 25-person engineering subcontractor can deploy Defender for Business via Microsoft 365 Business Premium, enroll devices in Intune for centralized policy, and enable Defender's tamper protection and cloud-delivered protection to satisfy the control.
3) Deploy, configure, and harden agents
Deploy agents with a central management console and enforce the following baseline settings: real-time protection enabled; automatic signature and engine updates (at least daily, preferably hourly for cloud-fed updates); behavioral/EDR sensors active for memory and process inspection; enable exploit mitigation; enable network protection/URL filtering where available. For servers, enable kernel-level scanning where supported and configure safe exclusions (e.g., backup directories, virtualization image stores) with strict rules to avoid blind spots. Technical specifics: enable tamper protection, require agent version >= vendor recommended, configure exclusions using hashes rather than wildcards when possible, and enable full-disk scheduled scans weekly with incremental scans daily.
4) Monitoring, logging, and detection tuning
Forward endpoint and server alerts to a central logging platform or SIEM (commercial or lightweight cloud SIEM) and set retention consistent with your compliance posture (e.g., 90 days minimum for investigative capability). Create alert rules for high-fidelity indicators such as execution from temporary directories, PowerShell with encoded commands, new persistence entries, or unusual outbound connections. Tune to reduce false positives — whitelist validated business tools by hash or publisher — while preserving telemetry needed for compliance evidence. Implementation tip: enable EDR telemetry ingestion into your SIEM and create a playbook that maps alerts to required evidence for FAR/CMMC audits.
5) Validate, test, and document
Validate the deployment by performing controlled tests: deploy the EICAR test file to confirm detection (do this in a controlled environment and follow vendor guidance), run simulated ransomware drills using tabletop exercises or safe emulation tools, and verify logging/alert workflows end-to-end. Maintain documentation: configuration baselines, agent deployment reports, update schedules, incident response playbooks, and proof of tests with timestamps. For audits, export centralized policy reports and EDR detection timelines showing that malicious code protection is active and effective.
Compliance tips and best practices
Adopt least privilege (remove local admin rights where possible) and application allowlisting (AppLocker or Microsoft Defender Application Control) to reduce attack surface. Integrate anti-phishing and secure email gateways to prevent malware delivery via attachments. Keep a documented patch management cadence (critical/important updates within 7 days where possible) because unpatched systems are a primary vector for malicious code. For small businesses without in-house security staff, consider a managed service provider (MSP) that provides centralized patching, EDR monitoring, and monthly compliance reports mapped to FAR/CMMC controls.
Risk of not implementing this requirement
Without effective malicious code protection, organizations face ransomware that can encrypt CUI and halt contract delivery, data exfiltration that leads to breach notifications and contract penalties, and supply-chain compromise that harms downstream partners. Noncompliance with FAR 52.204-21 or CMMC 2.0 can lead to lost contracts, remediation costs, reputational damage, and potential suspension from defense contracting. Technically, the lack of detection increases time-to-detect (TTD) and time-to-respond (TTR), giving adversaries more time to persist and escalate privileges.
Conclusion
Implementing malicious code protection across endpoints and servers to meet FAR 52.204-21 / CMMC 2.0 Level 1 SI.L1-B.1.XIII is a practical, achievable program: inventory assets, choose appropriate endpoint/EDR solutions, deploy and harden agents with centralized management, enable logging and SIEM ingestion, test detections, and document everything for audits. For small businesses, leveraging integrated platform offerings (e.g., Microsoft Defender ecosystem) or a trusted MSP can make the program affordable and auditable while materially reducing cyber risk.