Skip to content

3.14.5 — Scan Regularly

Perform periodic scans of organizational systems and real-time scans of files from external sources as files are downloaded, opened, or executed.

Two scanning modes, both required:

  1. Periodic full scans. Scheduled scans that examine all files on a system — not just new or changed ones. These catch malware that evaded real-time detection: threats that arrived before signatures were updated, dormant malware activated by a later trigger, or files that were exempt from real-time scanning due to exclusions. Define a frequency — weekly full scans is standard for CUI systems.

  2. Real-time scans of external files. Every file arriving from outside the system is scanned as it’s downloaded, opened, or executed. This covers: email attachments (scanned before or at delivery), web downloads (scanned on download), files from USB drives (scanned on access), and files transferred from external systems. Real-time protection must be active — not just installed.

The assessor checks three things:

  • Scan frequency is defined. Your policy specifies how often periodic scans run.
  • Periodic scans actually execute. Scan logs show scheduled scans completing per the defined frequency.
  • Real-time scanning is active for external files. Email attachments, downloads, and removable media are scanned as they arrive — not after.

Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Is the frequency for periodic scans defined?Policy specifies: weekly full scan (or similar defined frequency)
2Are periodic scans performed per the defined frequency?Scan logs showing completed scans on schedule for the past several months
3Are real-time scans of files from external sources performed?Real-time protection active; email attachments scanned at gateway; USB files scanned on access

Documents they’ll review: System and information integrity policy; procedures addressing malicious code protection; system security plan; system configuration showing scheduled scan settings and real-time protection; scan results and logs; records of malware detections

People they’ll talk to: System or network administrators; information security personnel; personnel responsible for malicious code protection

Live demos they’ll ask for: “Show me the scheduled scan configuration — what’s the frequency?” “Show me the last completed scan log.” “Is real-time protection enabled? Show me.” “Download a test file — show me it’s scanned.” “Insert a USB drive — show me it’s scanned on access.”


These are the actual questions. Have answers ready.

  • “How often do you run full malware scans? Show me the schedule.”
  • “Show me the scan log from the most recent scheduled scan.”
  • “Is real-time protection enabled on this system? Show me the configuration.”
  • “Are email attachments scanned before delivery to users?”
  • “What happens when a user inserts a USB drive — is it scanned?”
  • “Are files from external sources included in the scan scope — USB drives, downloads, attachments?”
  • “Has a periodic scan ever caught something that real-time missed?”

No scheduled scans. Real-time protection is on but no periodic scans are configured. Real-time catches arriving threats but doesn’t rescan existing files with updated signatures. A dormant threat that arrived before the latest signatures could persist indefinitely. Schedule periodic scans.

Real-time protection disabled. Disabled “temporarily” for performance or software installation and never re-enabled. Enable tamper protection to prevent users and local admins from disabling real-time scanning. Verify status centrally.

Not all systems scanned. Workstations are scanned but servers are excluded for performance reasons. The requirement says “organizational systems” — all CUI systems need both periodic and real-time scanning. Tune exclusions for server-specific processes rather than exempting the entire server.

USB drives not scanned. Users can insert USB drives and files are accessible without scanning. Configure your endpoint protection to scan removable media on access. Better yet, block USB storage entirely on CUI systems if the business permits it.

Email scanning gaps. Internal email is scanned but emails from external partners arrive unscanned because they bypass the email gateway. Ensure all email — regardless of source — passes through your mail filtering with attachment scanning.



RequirementWhy it matters here
3.14.2 — Deploy Anti-MalwareDeploys the protection mechanisms that perform these scans
3.14.4 — Keep Protection CurrentScans are only as good as the signatures — keep them updated
3.8.7 — Control Removable MediaUSB and removable media controls complement real-time scanning
3.13.1 — Guard the BoundariesBoundary protection scans external files at network entry points

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: SI.L2-3.14.5 | SPRS Weight: 3 points | POA&M Eligible: No