NCSRC NIRMATA
Home Guides Framework Start Assessment →
Home › Guides › Identity & Access › IS-02
IS-02 Identity & Access 8% of OML score

Is antivirus or endpoint security kept up to date automatically on all systems?

This question asks whether your company has set up automatic updates for antivirus and security software on every computer and device. If you have to manually update these programs, or if updates happen only sometimes, you are not protected against new viruses and hacking attempts that appear every day.

⚡
Why This Matters to Your Business

Outdated antivirus software is like a lock on your door that no longer works against modern thieves. A manufacturing unit in Tamil Nadu lost ₹8 lakh when ransomware encrypted their production data because their antivirus was 6 months out of date and could not detect the attack. Customers and business partners will ask for proof that your systems are secure—if you cannot show automatic updates, they will move to competitors. Regulatory audits for GST compliance or data protection can flag this as a critical finding, and some government tenders specifically require proof of automatic endpoint security updates.

📊
What Each Maturity Level Looks Like

Find where your organisation is today. Be honest — the self-assessment is only useful if it reflects reality.

Level 0
Absent

You check the antivirus status on a few computers and notice that most show 'Last Update: 3 months ago' or 'Updates disabled'. Nobody in your office is formally responsible for keeping security software current.

Level 1
Initial

You have installed antivirus on most computers, but updates happen only when an employee manually checks and clicks 'Update Now'—this happens once every few weeks or months. You have no central way to see which computers are actually protected.

Level 2
Developing

You have turned on automatic updates in the antivirus settings on most machines, and updates happen every few days. However, you have not checked whether the setting actually works, and some older computers or laptops do not have automatic updates enabled.

Level 3
Defined

All computers and servers have automatic antivirus updates enabled and working. You check the update status once a month by looking at each machine or using a basic admin tool to confirm updates happened. You have documented which antivirus product is used and where.

Level 4
Managed

You use a central management tool (like Windows WSUS or a paid endpoint protection platform) to push antivirus definitions and software updates automatically to all systems. You review update logs every week to confirm all machines received the latest definitions. You have a written policy that specifies automatic update settings.

Level 5
Optimised

Updates are fully automated and monitored through a security information system that alerts you immediately if any computer misses an update for more than 2 days. You track update compliance as part of monthly IT metrics reported to management. You have tested and documented what happens if an update fails on a critical system.

🚀
How to Move Up — Practical Steps
StepWhat to DoWhoEffort
0 → 1 Install or reactivate antivirus software (Windows Defender, Kaspersky Small Office, or similar) on every desktop and laptop in the office. Document the product name and version on a simple spreadsheet. IT person or owner 2-3 days
1 → 2 Go into antivirus settings on each computer and enable 'Automatic Updates' or 'Auto-Update Definitions'. Test by waiting 24 hours and checking that the definition date changed. Document this completion. IT person 1 week
2 → 3 Create a simple checklist and check antivirus status on all systems once per month. Record the date, machine name, and last update date in a file. Investigate any computer where the update is older than 7 days and fix the setting. IT person or designated admin 2-4 weeks to establish routine
3 → 4 Deploy a centralized endpoint management tool such as Windows WSUS (free for Windows) or Kaspersky Small Office Console. Configure it to push antivirus definition updates to all machines automatically. Set up weekly reporting. IT person, possibly with vendor support 1-2 months (includes testing and staff training)
4 → 5 Integrate endpoint protection alerts into a central monitoring dashboard. Set up automatic alerts if any device misses an update for 2+ days. Include update compliance in monthly IT reports to management. Test failure scenarios and document recovery procedures. IT person, with possible external consultant Ongoing (monitoring and reporting)
📁
Evidence You Should Have

Documents and records that prove your maturity level.

  • List of all computers, laptops, and servers with antivirus product name and version installed on each
  • Screenshot or export showing antivirus 'Automatic Updates' setting enabled on at least 10 sample machines
  • Monthly log or spreadsheet showing the last definition update date for all machines from the past 3 months
  • Written Endpoint Security Policy document that specifies automatic update requirements and who is responsible
  • Report or alert from your antivirus/management tool showing update status for all systems in the past 30 days
🔍
What an Auditor Will Ask

Prepare for these questions from customers or third-party reviewers.

  • "Can you show me that every computer in your office has automatic antivirus updates enabled right now? How do you verify this happens?"
  • "What antivirus product do you use, and how often do the virus definitions actually update? Do you have logs showing this?"
  • "If an employee's laptop is offline for a week, what happens when it comes back online? Will it automatically catch up on security updates?"
  • "What is your process if an automatic update fails on a critical server? Who gets notified and how quickly is it fixed?"
  • "Do you have a written policy that requires automatic updates, and has everyone who touches IT systems read it?"
🛠
Tools That Work in India
PurposeFree OptionPaid Option
Centralized management and automatic push of antivirus updates to all Windows computers in your office Windows WSUS (Windows Server Update Services)—built into Windows Server, requires one server or virtual machine in your office Kaspersky Small Office Security Console (₹15,000–25,000/year for up to 50 machines); Trend Micro Worry-Free Services (₹20,000–35,000/year for 10–50 endpoints)
Antivirus software with automatic self-updating capability for individual machines Windows Defender (built into Windows 10/11, updates through Windows Update); Avast Free Antivirus; AVG Free Antivirus Kaspersky Standard (₹2,500–3,500/year per machine); Norton 360 (₹3,500–4,500/year per machine); McAfee Total Protection (₹3,000–4,500/year per machine)
Simple monitoring and reporting dashboard to track whether antivirus updates are working across all machines GLPI (open-source asset and inventory management); Nagios (open-source monitoring—requires technical setup) Lansweeper (₹25,000–40,000/year for inventory and compliance reporting); SolarWinds RMM (₹50,000–80,000/year for small teams)
🛡
How This Makes You More Resilient
When antivirus updates happen automatically, your business avoids the 80% of cyberattacks that exploit known vulnerabilities—meaning your risk of ransomware, data theft, and disruption drops significantly. Instead of discovering a breach weeks later when a customer complains, you catch and block threats the same day they appear. Your business continuity improves because systems stay online and productive, and you avoid the cost of recovery, downtime, and customer trust damage.
⚠️
Common Pitfalls in India
  • Assuming Windows Defender or a free antivirus is enough and not configuring automatic updates—leaving devices unprotected for weeks. Many Indian SMEs install antivirus once and never check it again.
  • Buying antivirus licenses that expire but forgetting to renew them because the renewal notice goes to an email address that is no longer monitored. The software then stops updating silently.
  • Disabling automatic updates because they slow down old computers, not realizing this creates a security gap that is worse than the performance issue. One accounts firm in Bangalore had to pay ₹12 lakh in ransom because they had disabled updates on older machines.
  • Having automatic updates enabled on office computers but not on laptops used by remote employees or field teams, leaving those devices at high risk.
  • Setting up automatic updates but never checking if they actually work, only discovering months later during an incident that definitions stopped updating because the antivirus service crashed silently.
⚖️
Compliance References
StandardRelevant Section
DPDP Act 2023 Section 8(2)(d)—requirement for reasonable security measures including regular updates and patch management of systems storing personal data
CERT-In Guidelines 2022 Direction 4.2.1—organizations must ensure timely patching and updates of software and firmware to prevent exploitation of known vulnerabilities
ISO 27001:2022 Annex A, A.14.2.1 (System change control) and A.14.2.3 (Removal of access rights); implies automated controls to manage endpoint security
NIST CSF 2.0 Govern (GV) function—GV.RO-01 (Risk and security roles) and Protect (PR) function—PR.PS-02 (Asset and information management through automated tools)

Ready to assess your organisation?

Answer all 191 questions and get your NIRMATA maturity score across all 12 pillars.

Start Free Self-Assessment →

TRUST-IN Bharat · NIRMATA Framework · Licensed CC BY-SA 4.0 · Custodian: Elytra Security

← Back to all guides  ·  trustinbharat.org