Mick,
I have thoroughly scanned the server. I am not finding any malware or virus's.
I saw and read those documents. I did not see the files mentioned or registry entries. I think those assume the first communication is successful and the second communication infects.
I have updated SEP client and defintions. Again, nothing found.
Tried Malwarebytes - nothing
Tried an online scan - nothing
I reviewed all IIS logs - Don't see any activity that could cause the event like post commands using forms with injection or abnormal file uploads to the server. Symantec traffic and packet logs cleared so i don't have them to review. The default log size was too small. My Symantec/Veritas Backup Exec did not backup the logs. Appears backup exec skipped the whole area - maybe by design to not interfer with antivirus operation.
Been monitoring traffic and not seeing anything unusual.
My questions are still:
1) What happened to initiate the outbound communication? Somehow someone initiated a command that was not trapped or considered a potential threat by any of the security software. What could initiate outbound communication on a web server that someone on the outside invokes? I think we all just got lucky the outbound communication got stopped.
2) Since we do not do anything with countries like China and Russia, is there a way to block communication in the SEP firewall by Country? I don't have a problem blocking all inbound and outbound traffic them.
Ideas?