Hi Ahmed You need to analyse the Firewall Logs. There are 2 ways of doing it, firstly I just scan through the logs very quickly and try to look for the same IP Address that is being repeated at a VERY high frequency. This is a quick (yet unreliable) way to find the infected workstation. The best way is to actually install Network Monitor on your Firewall server and start a trace on the Internal NIC. Let it run for about 5 minutes and then view the trace. Then enable an ICMP filter to only show the ICMP traffic and then you will very quickly see which workstation is causing all the havoc on your network. By the way, if you are not fast enough to get to all the infected machines, I suggest that you disable the "Allow Outbound ICMP" packet filter on your Firewall. This will at least stop all these outbound ICMP's clogging your internet link. Cheers William R. -----Original Message----- From: Nabil, Ahmed [mailto:anmahmou@xxxxxxxxxx] Sent: 30 November 2003 11:46 AM To: [ISAserver.org Discussion List] Subject: [isalist] RE: Nachi http://www.ISAserver.org Which logs should i analuze, there are three different types of logs in the ISA Logs folder (Web, Firewall....etc) Is it the WEB ?? How Can i know the machine infecting the ISA (having the virus), What is my criteria ?? Is it the port number ? In most cases the Port is not enough. Please advice. Thanks, Ahmed --------------------------------------------------------------------- Everything in this e-mail and attachments relating to the official business of Columbus Stainless is proprietary to the company. It is confidential, legally privileged and protected by law. Columbus Stainless does not own and endorse any other content. Views and opinions are those of the sender unless clearly stated as being that of Columbus Stainless. The person addressed in the e-mail is the sole authorised recipient. Please notify the sender immediately if it has unintentionally reached you and do not read, disclose or use the content in any way. Whilst all reasonable steps are taken to ensure the accuracy and integrity of information and data transmitted electronically and to preserve the confidentiality thereof, no liability or responsibility whatsoever is accepted if information or data is,for whatever reason, corrupted or does not reach its intended destination. ---------------------------------------------------------------------