Outdated antivirus software is like a lock on your door that no longer works against modern thieves. A manufacturing unit in Tamil Nadu lost ₹8 lakh when ransomware encrypted their production data because their antivirus was 6 months out of date and could not detect the attack. Customers and business partners will ask for proof that your systems are secure—if you cannot show automatic updates, they will move to competitors. Regulatory audits for GST compliance or data protection can flag this as a critical finding, and some government tenders specifically require proof of automatic endpoint security updates.
Find where your organisation is today. Be honest — the self-assessment is only useful if it reflects reality.
Absent
You check the antivirus status on a few computers and notice that most show 'Last Update: 3 months ago' or 'Updates disabled'. Nobody in your office is formally responsible for keeping security software current.
Initial
You have installed antivirus on most computers, but updates happen only when an employee manually checks and clicks 'Update Now'—this happens once every few weeks or months. You have no central way to see which computers are actually protected.
Developing
You have turned on automatic updates in the antivirus settings on most machines, and updates happen every few days. However, you have not checked whether the setting actually works, and some older computers or laptops do not have automatic updates enabled.
Defined
All computers and servers have automatic antivirus updates enabled and working. You check the update status once a month by looking at each machine or using a basic admin tool to confirm updates happened. You have documented which antivirus product is used and where.
Managed
You use a central management tool (like Windows WSUS or a paid endpoint protection platform) to push antivirus definitions and software updates automatically to all systems. You review update logs every week to confirm all machines received the latest definitions. You have a written policy that specifies automatic update settings.
Optimised
Updates are fully automated and monitored through a security information system that alerts you immediately if any computer misses an update for more than 2 days. You track update compliance as part of monthly IT metrics reported to management. You have tested and documented what happens if an update fails on a critical system.
| Step | What to Do | Who | Effort |
|---|---|---|---|
| 0 → 1 | Install or reactivate antivirus software (Windows Defender, Kaspersky Small Office, or similar) on every desktop and laptop in the office. Document the product name and version on a simple spreadsheet. | IT person or owner | 2-3 days |
| 1 → 2 | Go into antivirus settings on each computer and enable 'Automatic Updates' or 'Auto-Update Definitions'. Test by waiting 24 hours and checking that the definition date changed. Document this completion. | IT person | 1 week |
| 2 → 3 | Create a simple checklist and check antivirus status on all systems once per month. Record the date, machine name, and last update date in a file. Investigate any computer where the update is older than 7 days and fix the setting. | IT person or designated admin | 2-4 weeks to establish routine |
| 3 → 4 | Deploy a centralized endpoint management tool such as Windows WSUS (free for Windows) or Kaspersky Small Office Console. Configure it to push antivirus definition updates to all machines automatically. Set up weekly reporting. | IT person, possibly with vendor support | 1-2 months (includes testing and staff training) |
| 4 → 5 | Integrate endpoint protection alerts into a central monitoring dashboard. Set up automatic alerts if any device misses an update for 2+ days. Include update compliance in monthly IT reports to management. Test failure scenarios and document recovery procedures. | IT person, with possible external consultant | Ongoing (monitoring and reporting) |
Documents and records that prove your maturity level.
- List of all computers, laptops, and servers with antivirus product name and version installed on each
- Screenshot or export showing antivirus 'Automatic Updates' setting enabled on at least 10 sample machines
- Monthly log or spreadsheet showing the last definition update date for all machines from the past 3 months
- Written Endpoint Security Policy document that specifies automatic update requirements and who is responsible
- Report or alert from your antivirus/management tool showing update status for all systems in the past 30 days
Prepare for these questions from customers or third-party reviewers.
- "Can you show me that every computer in your office has automatic antivirus updates enabled right now? How do you verify this happens?"
- "What antivirus product do you use, and how often do the virus definitions actually update? Do you have logs showing this?"
- "If an employee's laptop is offline for a week, what happens when it comes back online? Will it automatically catch up on security updates?"
- "What is your process if an automatic update fails on a critical server? Who gets notified and how quickly is it fixed?"
- "Do you have a written policy that requires automatic updates, and has everyone who touches IT systems read it?"
| Purpose | Free Option | Paid Option |
|---|---|---|
| Centralized management and automatic push of antivirus updates to all Windows computers in your office | Windows WSUS (Windows Server Update Services)—built into Windows Server, requires one server or virtual machine in your office | Kaspersky Small Office Security Console (₹15,000–25,000/year for up to 50 machines); Trend Micro Worry-Free Services (₹20,000–35,000/year for 10–50 endpoints) |
| Antivirus software with automatic self-updating capability for individual machines | Windows Defender (built into Windows 10/11, updates through Windows Update); Avast Free Antivirus; AVG Free Antivirus | Kaspersky Standard (₹2,500–3,500/year per machine); Norton 360 (₹3,500–4,500/year per machine); McAfee Total Protection (₹3,000–4,500/year per machine) |
| Simple monitoring and reporting dashboard to track whether antivirus updates are working across all machines | GLPI (open-source asset and inventory management); Nagios (open-source monitoring—requires technical setup) | Lansweeper (₹25,000–40,000/year for inventory and compliance reporting); SolarWinds RMM (₹50,000–80,000/year for small teams) |
- Assuming Windows Defender or a free antivirus is enough and not configuring automatic updates—leaving devices unprotected for weeks. Many Indian SMEs install antivirus once and never check it again.
- Buying antivirus licenses that expire but forgetting to renew them because the renewal notice goes to an email address that is no longer monitored. The software then stops updating silently.
- Disabling automatic updates because they slow down old computers, not realizing this creates a security gap that is worse than the performance issue. One accounts firm in Bangalore had to pay ₹12 lakh in ransom because they had disabled updates on older machines.
- Having automatic updates enabled on office computers but not on laptops used by remote employees or field teams, leaving those devices at high risk.
- Setting up automatic updates but never checking if they actually work, only discovering months later during an incident that definitions stopped updating because the antivirus service crashed silently.
| Standard | Relevant Section |
|---|---|
| DPDP Act 2023 | Section 8(2)(d)—requirement for reasonable security measures including regular updates and patch management of systems storing personal data |
| CERT-In Guidelines 2022 | Direction 4.2.1—organizations must ensure timely patching and updates of software and firmware to prevent exploitation of known vulnerabilities |
| ISO 27001:2022 | Annex A, A.14.2.1 (System change control) and A.14.2.3 (Removal of access rights); implies automated controls to manage endpoint security |
| NIST CSF 2.0 | Govern (GV) function—GV.RO-01 (Risk and security roles) and Protect (PR) function—PR.PS-02 (Asset and information management through automated tools) |
Ready to assess your organisation?
Answer all 191 questions and get your NIRMATA maturity score across all 12 pillars.
Start Free Self-Assessment →