Provide protection from malicious code at appropriate locations
Malicious code including viruses, ransomware, trojans, and spyware must be detected and blocked before it can execute or spread. Antivirus and endpoint detection and response tools deployed on workstations, servers, and at email gateways are the primary defenses. Coverage matters: a single unprotected endpoint is an entry point that can spread malware across your entire environment.
Implementation steps
- 1
Deploy endpoint protection on all workstations and servers
Install antivirus or EDR software on every workstation, laptop, and server that processes FCI. Verify that the agent is active and reporting. Use a centralized management console to track coverage so you can identify systems without protection.
crowdstrike sentinelone microsoft-defender carbon-black - 2
Configure real-time protection
Enable real-time or on-access scanning so malicious files are detected when they are downloaded, opened, or executed rather than only during scheduled scans. Configure automatic remediation (quarantine or delete) for detected threats so malicious files cannot execute even if the user dismisses an alert.
crowdstrike sentinelone microsoft-defender - 3
Deploy malware protection at email and web gateways
Email is the most common malware delivery vector. Deploy an email security gateway that scans attachments and links for malicious content before they reach user inboxes. Configure web proxy or DNS filtering to block access to known malicious domains and prevent malware downloads.
proofpoint mimecast microsoft-defender-for-office cisco-umbrella zscaler
Evidence required
Endpoint protection coverage report
Evidence that malware protection is installed and active on all in-scope endpoints.
- - EDR/AV management console coverage report
- - Endpoint protection deployment policy
Real-time protection configuration
Evidence that on-access scanning is enabled on deployed endpoint protection.
- - Endpoint protection configuration screenshot showing real-time protection enabled
Email/web gateway protection evidence
Evidence of malware scanning at email and web gateways.
- - Email security gateway configuration
- - Web filtering policy screenshot
- - Threat summary report from email gateway
Related controls
Update malware protection mechanisms when new releases are available
Malware Protection
Perform periodic system scans and real-time scans of files from external sources
System Scanning
Identify, report, and correct information system flaws in a timely manner
Flaw Remediation