This guide explains how to implement both periodic (scheduled) and real-time (on-access) file scanning to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 Control SI.L1-B.1.XV, with hands-on steps, configuration tips, evidence collection for assessments, and practical examples for small businesses.
Scope, objectives, and compliance-context
At its core, FAR 52.204-21 and CMMC 2.0 Level 1 require contractors to safeguard Federal Contract Information and detect malicious content; the specific practice SI.L1-B.1.XV expects controls that detect malicious code by scanning files in both recurring (periodic) and on-access (real-time) fashions. For Compliance Framework practitioners, the objective is clear: implement a defensible, documented scanning capability across endpoints, servers, and cloud storage that produces logs and remediation workflows auditors can review during a self-assessment or contract audit.
Step-by-step deployment guide
1) Inventory assets, define coverage, and write the scanning policy
Begin with an asset inventory: list endpoints (Windows/Mac/Linux), servers, file shares (SMB/NFS), cloud storage (S3, Azure Blob), and mail gateways. Define which paths require on-access scanning (e.g., user home directories, shared project folders, email attachments) and which can be scanned periodically only (e.g., archival backups). Produce a short scanning policy that includes scan types (signature + heuristics + ML), update cadence, retention of logs, SLA for remediation (e.g., 24 hours for high-severity detections), and approved product list; this policy is your primary evidence artifact for compliance.
2) Select tools and architecture (practical options for small businesses)
Choose tooling based on budget and environment. Examples for small businesses: Microsoft Defender for Business (Windows integrated, on-access + scheduled), ClamAV with freshclam for Linux servers (open source), or lightweight commercial EDRs (CrowdStrike, SentinelOne) that include on-access scanning and cloud connectors. For cloud object storage, consider native scanning (AWS Lambda + ClamAV triggered by S3 events) or third-party SaaS scanners that integrate with IAM. Important architecture decisions: central management (console) for policy pushes, whether to enable on-access scanning on build servers (usually excluded), and how to protect scanning servers themselves (harden, restrict access).
3) Configure periodic scanning (schedules, scope, and tuning)
Implement scheduled full and incremental scans: example schedule — quick daily incremental on high-risk file stores (every 4–12 hours), full system or share scan weekly (off-hours). On Linux use cron: "0 2 * * * clamscan -r /srv/shared --log=/var/log/clamscan.log" and keep signature updates with "freshclam" before the scan. On Windows, configure Task Scheduler to run Defender's MpCmdRun.exe: "MpCmdRun.exe -SignatureUpdate" then "MpCmdRun.exe -Scan -ScanType 2" for a full scan. Tune exclusions to avoid scanning build directories, VM images, and other high-churn artifacts; document exclusions and the business justification in your policy so assessors can see you balanced security and availability.
4) Configure real-time (on-access) scanning and performance considerations
Enable on-access scanning on endpoints and file servers where feasible. On Windows, enable real-time protection in Defender or your AV product; on Linux, use fanotify/inotify-based on-access solutions or an agent-based EDR. For network file shares, prefer file-server-level scanning (server-side) vs. client-only because it captures files uploaded from any client. Performance tips: limit on-access scanning to executable and document types (e.g., .exe, .dll, .pdf, .docx, .xlsm) and high-risk directories, throttle CPU usage during business hours, and enable asynchronous scanning for large files. Record configuration snapshots (settings exported from the management console) as evidence for compliance reviews.
5) Logging, alerting, remediation, and evidence collection
Centralize logs and alerts using a SIEM or lightweight log aggregator (e.g., Elastic, Splunk, or a cloud-native service). Ensure each detection record contains: timestamp, hostname, user context, file path, file hash, detection name, action taken (quarantine, delete), and ticket/reference number. Retain detection logs and scan results per contract requirements — a practical baseline is 6–12 months, but follow your contract or corporate policy. Automate ticket creation for high/critical detections and record closure notes to demonstrate remediation. For assessments, export weekly scan summary reports, signature-update history, and screenshots of policy settings; these are the artifacts reviewers will request.
Risks, best practices, and small-business examples
Risk of not implementing: undetected malicious files can lead to ransomware, data exfiltration, or a supply-chain compromise—outcomes that can cause loss of contracts, regulatory penalties, and reputational damage. Best practices: keep signature/ML engines updated (at least daily), perform change control for exclusions, test configuration changes in a lab, maintain an incident playbook tied to detection severity, and ensure staff understand escalation paths. Small-business scenarios: a 15-person engineering firm can run Microsoft Defender for Business across endpoints, schedule nightly SMB share scans on the file server, and use an S3-triggered Lambda with ClamAV for cloud backups; a boutique software shop might exclude build artifacts but enforce scanning on artifact repositories and CI/CD pipelines for uploaded third-party libraries.
Practical compliance tips: document everything (policy, inventories, schedules, configuration exports), maintain a simple metrics dashboard (detection counts, mean time to remediate), and include scanning processes in internal audits. If resource-constrained, use managed services or MSSPs to host the management console and provide retained logs; ensure contractual terms allow you to produce the required artifacts for FAR/CMMC self-assessments.
Summary
Implementing periodic and real-time file scanning to meet FAR 52.204-21 and CMMC 2.0 Level 1 is a combination of policy, tool selection, careful configuration, and evidence collection: inventory assets, choose appropriate on-access and scheduled scanners, tune performance and exclusions, centralize logs and alerts, and retain artifacts for assessment. For small businesses, practical, cost-effective toolsets (built-in OS defenders, ClamAV, cloud Lambdas) plus disciplined documentation and remediation workflows will satisfy the SI.L1-B.1.XV practice while materially reducing the risk of malicious code entering your environment.