🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Update Antivirus and EDR Tools and Record Compliance Evidence — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SI.L2-3.14.4

Step-by-step guidance for keeping antivirus and EDR tools updated and producing audit-ready evidence to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 SI.L2-3.14.4 compliance.

April 12, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how small and mid-sized organizations can operationally meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 Control SI.L2-3.14.4 by keeping antivirus (AV) and endpoint detection & response (EDR) tools current and by collecting and preserving the evidence auditors expect. It focuses on concrete steps, sample commands and artifacts, and pragmatic trade-offs that a small business can implement with limited staff or through managed services.

Compliance Framework context — Practice, Requirement, Key Objectives, Implementation Notes

Practice: Ensure AV/EDR solutions are kept up to date and that update activity is recorded as part of continuous monitoring. Requirement: Configure tools so signature/definition updates and agent/software updates are applied in a timely manner, and produce verifiable records of the update status. Key objectives: reduce the window of exposure to known threats, demonstrate to assessors that controls are effective, and provide reliable evidence (logs, exports, screenshots, tickets) for audits. Implementation notes: centralize management (cloud console, Intune, SCCM, EDR management), automate where possible, and define an evidence-retention policy consistent with contract/CUI requirements.

Operational steps — how to implement and demonstrate compliance

1) Inventory endpoints and tools: maintain an authoritative list of managed endpoints, operating systems, AV/EDR product and agent versions, and assigned owners. 2) Configure automatic signature/definition updates: set AV signature updates to run at least daily (preferably multiple times per day or real-time updates if supported). 3) Manage agent/software updates centrally: for agent software (EDR binaries), schedule monthly rollout windows with emergency hotfix capability. 4) Test updates in a small pilot group before enterprise-wide deployment to avoid mass-impact failures. 5) Instrument verification: create automated checks (scripts, console exports, or SIEM queries) that record the current definition version, agent version, timestamp, and verification status for each host.

Technical examples and commands

Windows Defender example: run Get-MpComputerStatus in PowerShell to show current signatures and last update times (look for AntispywareSignatureVersion, AntispywareSignatureLastUpdated). A simple remote collection pattern is: enumerate hosts from Active Directory or SCCM, then run Invoke-Command { Get-MpComputerStatus } and aggregate results into a CSV. Sample CSV columns to export: hostname, IP, OS, AV-Product, AV-Agent-Version, Signature-Version, Signature-Last-Updated (UTC), Last-Scan (UTC), Update-Method. For EDR consoles (CrowdStrike, SentinelOne, Carbon Black, Microsoft Defender for Endpoint), use the vendor's management console to export agent inventories and timestamps—these exports are high-value evidence because they include server-side timestamps and signatures. On Linux endpoints, confirm the EDR service with systemctl status or by querying the agent binary for its version.</p>

Evidence to collect and how to store it

Auditors expect verifiable, tamper-resistant artifacts. For each periodic evidence capture, record: who collected it, source (EDR console export, script output, SIEM event), UTC timestamp, the dataset (list of hosts and fields described above), and a snapshot of the policy/configuration that produced the behavior (e.g., Defender update policy, EDR auto-update policy). Store these artifacts in a secure, access-controlled repository (example: versioned SharePoint, AWS S3 with audit logging, or an on-premise secured file server). Retention: retain evidence per contract or CUI rules — if unspecified, a practical baseline is 12 months for regular evidence and 3 years for change-control records and incident artifacts.

Small business scenario — concrete example

Example: a 60-seat defense subcontractor runs Microsoft Defender on desktops and CrowdStrike Falcon on servers/workstations. They configure Defender to install definition updates multiple times per day via Microsoft Update and manage agent/EDR updates using Intune and the CrowdStrike cloud console. Weekly automated jobs export agent inventories from CrowdStrike and Defender status from SCCM/Intune into a secure SharePoint folder. A simple PowerShell job aggregates these exports into a monthly compliance report (CSV + PDF of console export) and files a ticket in the company's IT ticketing system that references the artifact and retention period. For auditors, this provides: continuous console data (server-side), periodic snapshot exports (CSV + hash), and change-control tickets documenting any exceptions or failed updates.

Best practices, automation, and audit tips

Automate evidence collection and signing: scheduled exports from the EDR console and scripted endpoint queries reduce human error. Record checksums (SHA256) of exports and preserve them alongside the artifact to show integrity. Include a simple metadata manifest with each evidence file (collector name, tool/version used to collect, collection script version). Monitor update failures via alerts in your SIEM or the EDR console and require root-cause ticketing for any host failing updates for more than 24–48 hours. Create a short written audit playbook: where to find the console exports, which queries to run live, and how to present artifacts in the assessment portal.

Risks of not implementing this control

Failing to keep AV/EDR updated and to retain evidence materially increases the risk of a successful malware or ransomware attack and weakens your position during post-breach анализа. From a compliance perspective, missing evidence or inconsistent update policies can lead to partial or failed assessments, potential loss of contract eligibility, and reputational harm. Practical examples include delayed detection of commodity malware because signature updates weren't applied, or inability to prove timely remediation during a CMMC assessment because no verifiable records existed.

In summary, meeting SI.L2-3.14.4 is primarily an operational discipline: maintain an accurate inventory; enable and test automated updates; centralize management for agent and signature updates; automate periodic evidence exports (with checksums, timestamps, and metadata); and retain artifacts according to contract/CUI requirements. For small businesses, leverage cloud-managed EDR consoles, Intune/SCCM or MSSPs to reduce operational burden, and codify a short audit playbook so you can quickly produce the exact evidence auditors will request.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes