Just finished decrypting the files on the one machine that got hit. Had to pay $750 1.9 bit coins. After converting the money, the bit coin value dropped and it was showing 2.1 bit coins, but they still accepted the payment of 1.9. After payment the personal TOR web site changes to payment confirmation, and a download link for decrypter.zip. Decrypting took about 20 minutes for the whole computer. It looks like they got in by sending mass emails, mentioning something like "ADP invoice week ending 14/10/2014" with an attached .zip file that contains an .exe . The user double clicked true the attachment without reading anything. CryptoWall 2.0 seems to start of slowly and invisibly. Once it has everything (.txt .jpg .xlsx .mdb) encrypted, it stops encrypting and starts asking for the ransom. It does not seem to damage windows, so the computer stays usable. I have copies of the original ransom-ware and the decrypter if anyone cares, but I doubt there is anything useful in the compiled code.
Measures taken after incident:
Disabled most incoming email attachments on company emails by file extension (.zip .rar and few other, set to quarantine just in case legit emails get blocked).
Changed anti-virus to Avast with email scan engine.
Changed group policy to not allow code execution from most locations that crypto-ransom software likes to start in (example, temp folder) using CryptoPrevent free software made by foolibleep(set to Maximum).
Enabled remote user file backup (weekly full backups, with incremental daily, and 2 week retention)(Symantec Backup Exec 2012 sp3).
...please comment if there is something more that can be done in this domain, windows 7 environment.