Back to Blog

Malware Protection Requirements for Cyber Essentials Plus

Malware Protection Requirements for Cyber Essentials Plus

Malware protection is the fourth of the five technical controls in the Cyber Essentials scheme, and it is arguably the most actively tested during a Cyber Essentials Plus assessment. Unlike other controls where the assessor inspects configurations and reviews settings, the malware protection control involves live testing — the assessor will actually attempt to deliver malware to your systems and verify that it is blocked.

This guide covers the malware protection requirements for Cyber Essentials Plus in detail, including the three approved approaches to malware defence, what the assessor will test, common failure points, and how to ensure your protection passes the independent technical audit.

560,000
new malware variants detected every day globally (AV-TEST Institute)

The Three Approved Approaches

The Cyber Essentials standard recognises three approaches to malware protection. You must implement at least one on every device in scope:

Anti-Malware Software

Traditional and next-gen AV that detects and blocks malicious files, URLs, and behaviours in real time.

Most common approach

Application Allowlisting

Only pre-approved applications can run. Everything else is blocked by default, including malware.

Strongest but most restrictive

Sandboxing

Applications run in isolated environments so malware cannot affect the wider system.

Specialised use cases

Approach 1: Anti-Malware Software (Most Common)

The vast majority of organisations meet this control using anti-malware software. The standard requires that anti-malware is:

Installed on every device in scope: Every workstation, laptop, server, and mobile device must have anti-malware software. This includes macOS devices and mobile devices — not just Windows PCs.

Configured for automatic updates: Malware definitions must be updated automatically and frequently (at least daily). Running outdated definitions is almost as bad as running no protection at all.

Set for real-time scanning: The anti-malware must scan files in real time as they are accessed, created, or downloaded. Scheduled-only scanning is not sufficient.

Configured to scan web pages: The software should block connections to known malicious websites and scan web content as it is accessed through browsers.

Set to scan email: If email is downloaded to the device (rather than accessed via a web browser only), the anti-malware should scan email attachments.

Key Insight: Windows Defender (now called Microsoft Defender Antivirus) is an acceptable anti-malware solution for Cyber Essentials Plus. You do not necessarily need a third-party product, but Defender must be properly configured with real-time protection enabled, automatic updates turned on, and cloud-delivered protection active.

Approach 2: Application Allowlisting

Application allowlisting (also known as application whitelisting) takes a different approach to malware prevention. Instead of trying to identify and block malicious software, it only permits approved applications to run. Everything else — including any malware — is automatically blocked.

This approach is extremely effective but can be more complex to manage, as every legitimate application needs to be explicitly approved. It is most commonly used in environments with a fixed set of applications (such as kiosks, point-of-sale systems, or specialised workstations).

Tools that can implement application allowlisting include Windows AppLocker, Windows Defender Application Control (WDAC), and third-party solutions.

Approach 3: Sandboxing

Sandboxing isolates applications in a contained environment so that even if malware is present, it cannot affect the underlying operating system or other applications. This approach is less commonly used as a primary malware defence but can complement anti-malware software in specific scenarios.

How Malware Protection Is Tested in CE+

This is where the Cyber Essentials Plus assessment becomes truly hands-on. The assessor actively tests your malware protection using industry-standard techniques:

EICAR Test File Downloads

The assessor will attempt to download EICAR test files using web browsers on sampled devices. EICAR files are industry-standard test files that are detected by all reputable anti-malware products as malicious, but are completely harmless. They allow malware protection to be tested safely without using real malware.

The EICAR test comes in several forms:

Test File Type Description Expected Result
eicar.com Standard EICAR test string as a .com file Blocked or quarantined
eicar.com.txt EICAR test string as a text file Blocked or quarantined
eicar_com.zip EICAR file within a ZIP archive Blocked or quarantined
eicarcom2.zip EICAR file within a nested ZIP archive Blocked or quarantined

The assessor will attempt to download these files via HTTP and HTTPS. If any EICAR test file successfully reaches a device without being blocked, it constitutes a failure.

Email Malware Testing

The assessor will send test emails containing EICAR files (or similar harmless test patterns) as attachments to verify that your email filtering blocks them before they reach users' inboxes. This tests both your email security gateway and any endpoint protection.

Browser and Download Protection

The assessor verifies that your anti-malware prevents connections to known malicious websites and blocks malicious downloads. They may test this by attempting to access known malware distribution URLs (using safe test URLs provided by the testing framework).

4 Tests
EICAR test file variants the assessor will attempt to download on every sampled device

Common Malware Protection Failures

Malware protection is one of the most common areas where organisations fail their CE+ assessment. Here are the typical causes:

Most Common Malware Protection Failures

EICAR file downloaded without blocking32%
No anti-malware on macOS devices24%
Outdated malware definitions18%
Real-time protection disabled15%
Test emails reaching user inbox11%

Malware Protection for Different Operating Systems

Windows

Windows is the primary target for malware, and the options for protection are extensive. Microsoft Defender Antivirus is included with Windows 10 and 11 and is a fully acceptable solution for CE+. However, it must be properly configured:

Real-time protection: Must be enabled.

Cloud-delivered protection: Should be enabled for enhanced detection capabilities.

Automatic sample submission: Recommended for improved threat intelligence.

Tamper protection: Should be enabled to prevent malware from disabling Defender.

Alternatively, third-party solutions such as Sophos, Bitdefender, CrowdStrike, SentinelOne, or ESET are all suitable options.

macOS

A common misconception is that macOS devices do not need anti-malware protection. This is incorrect for Cyber Essentials Plus. While macOS has some built-in protections (XProtect, Gatekeeper), the standard requires additional anti-malware software on macOS devices in scope.

Suitable options include Sophos Home/Business, CrowdStrike Falcon, SentinelOne, Bitdefender, and Malwarebytes for Mac.

Critical Warning: macOS devices without third-party anti-malware software are one of the most common causes of CE+ assessment failure. Do not assume that the built-in macOS security features are sufficient. Deploy a proper anti-malware solution on every Mac in scope.

Mobile Devices (iOS and Android)

Mobile device malware protection requirements depend on the platform:

Android: Anti-malware software should be installed on Android devices, as Android's open nature makes it more susceptible to malware. Google Play Protect provides some baseline protection, but additional anti-malware is recommended.

iOS: Due to iOS's sandboxed architecture, traditional anti-malware is not typically required. However, the device must be kept up to date, only install apps from the App Store, and be managed through an MDM solution where possible.

Linux

If Linux servers or workstations are in scope, anti-malware should be deployed. ClamAV is a free option, while commercial solutions from Sophos, CrowdStrike, and others provide enterprise-grade protection.

Email Security: A Critical Layer

Because the CE+ assessment includes email malware testing, your email security infrastructure is directly in scope. Effective email security for CE+ typically includes:

Email gateway filtering: A cloud-based or on-premises email security gateway that scans all inbound email for malware, phishing links, and suspicious attachments before they reach user inboxes. Microsoft Defender for Office 365, Mimecast, Proofpoint, and Barracuda are popular options.

Attachment filtering: Block or quarantine high-risk attachment types (.exe, .bat, .cmd, .js, .vbs, .scr, and similar executable file types). The assessor's test email will include attachments that should be blocked.

Link scanning: Scan URLs in emails for known malicious destinations. This catches phishing emails that rely on links rather than attachments.

Sandboxing: Advanced email security solutions can sandbox attachments — opening them in an isolated environment to check for malicious behaviour before delivering them to the user.

94%
of malware is delivered via email (Verizon DBIR)

Pre-Assessment Testing: Do It Yourself First

Before the official CE+ assessment, you should run your own malware protection tests to verify everything is working correctly. Here is how:

Step 1: Download the EICAR test files from eicar.org on every sampled device. Test all four variants (eicar.com, eicar.com.txt, eicar_com.zip, eicarcom2.zip) via both HTTP and HTTPS.

Step 2: Send test emails with EICAR attachments to representative mailboxes. Verify they are blocked by your email security gateway.

Step 3: Check the anti-malware console on each device to confirm: real-time protection is active, definitions are up to date (within the last 24 hours), and all protection features are enabled.

Step 4: Verify that your anti-malware blocks access to known malicious URLs. Many anti-malware products include web protection; test it by attempting to visit a known-safe test URL that should be blocked.

Step 5: Document the results. If any test fails, remediate and retest before the official assessment.

Pro Tip: Run EICAR tests on every device type in your environment, not just a few. Different device types (Windows, Mac, mobile) may have different anti-malware configurations, and the assessor may sample any of them. A failure on a single device can hold up your entire certification.

Beyond the Minimum: Best Practices

While the Cyber Essentials standard sets the minimum requirements, these additional measures will significantly strengthen your malware defences:

Endpoint Detection and Response (EDR): Modern EDR solutions go beyond traditional anti-malware by detecting suspicious behaviours, providing forensic capabilities, and enabling automated response to threats.

DNS filtering: Block access to known malicious domains at the DNS level, preventing devices from connecting to command-and-control servers or downloading additional malware payloads.

Email authentication: Implement SPF, DKIM, and DMARC for your email domain to prevent spoofing and reduce the chance of phishing emails reaching your users from attackers impersonating your organisation.

User awareness training: While not a technical control, educating users about phishing, suspicious attachments, and social engineering significantly reduces the likelihood of malware infection.

How Cloudswitched Helps

Malware protection is one of the areas where our pre-assessment testing delivers the most value. We replicate the exact tests the assessor will perform, identifying any gaps in your protection before the official assessment. We deploy, configure, and verify anti-malware across your entire device estate, including those commonly-forgotten macOS devices and mobile endpoints.

Our managed CE+ service ensures that every device in scope has properly configured, up-to-date malware protection that will pass the hands-on testing with confidence.

Ready to Get Certified?

Cloudswitched handles your entire Cyber Essentials Plus certification end-to-end — including deploying and verifying malware protection across every device in your environment.

View CE+ Services

Malware protection is your last line of defence against malicious software that has evaded your firewalls, bypassed your access controls, and exploited vulnerable configurations. When it works — and when it is tested to prove it works — it prevents the attacks that could otherwise cause devastating damage to your organisation. Getting it right for Cyber Essentials Plus means getting it right for real-world protection.

Tags:Cyber Essentials PlusMalware ProtectionAnti-Virus
CloudSwitched
CloudSwitched

Centrally located in London, Shoreditch, we offer a range of IT services and solutions to small/medium sized companies.