Everyone is probably aware there is a virus/worm going around under many names. Its currently idle so people may not necessarily know they are infected.
You can easily check for suspicious machines on your network by dropping to a shell and running the following command on your untangle server
edit:
for 7.0+
for 6.2 and before:Code:curl -q http://untangle.com/download/patches/7.1/conficker_query.sh | sh
This will find hits to website that the conficker is known to visit after infection. It lists the internal IP followed by the number of visits to suspicious websites. If some machines have many visits it may be worth investigating.Code:curl -q http://untangle.com/download/patches/6.0/conficker_query.sh | sh
If you do have infected machines, kaspersky has a free removal utility here:
http://support.kaspersky.com/faq/?qid=208279973
This is a good opportunity to reiterate a couple basics:
1) Don't give windows machines a public IP - put them behind NAT and use port forwards
2) Patch your machines - autoinstallation of patches works great for most computers.
The virus vendors in Untangle do have the signatures, but this one has many ways to spread. This one can even spread by USB fobs using autoexec - so be careful!
edit:
easy way to check on the host itself:
http://www.confickerworkinggroup.org...feyechart.html