- "This issue does not affect any Dell PowerEdge servers shipped from our factories and is limited to a small number of the replacement motherboards only which were sent via Dell's service and replacement process for four servers: PowerEdge R310, PowerEdge R410, PowerEdge R510 and PowerEdge T410. The maximum potential exposure is less than 1 percent of these server models.
- Dell has removed all impacted motherboards from the service supply. New shipping replacement stock does not contain the malware.
- The W32.Spybot worm was discovered in flash storage on the motherboard during Dell testing. The malware does not reside in the firmware.
- All industry-standard antivirus programs on the market today have the ability to identify and prevent the code from infecting the customer's operating system.
- Systems running non-Microsoft Windows operating systems cannot be affected.
- Systems with the iDRAC Express or iDRAC Enterprise card installed cannot be affected.
- Remaining systems can only be exposed if the customer chooses to run an update to either Unified Server Configurator (USC) or 32-bit Diagnostics."
McGinnis's response does address the problem pretty soundly. However, the company's approach to alerting users to the problem isn't sitting well with some customers. "So why is there no information in the recall links or other readily obvious place on the site?" one forum user posted. "I also received a call about it, but had no way of knowing if this was a legitimate issue."
Another user, in fact, even questioned whether McGinnis was who he claimed. In his post, he didn't mention his full name, title, or any other such information; he just posted under the screen name DELL-Matt M. Only by registering for the Dell Support Forum can you click on his hyperlinked screen name to see his bio which reveals his full name and title.
There has to be a customer service (and PR) lesson somewhere for Dell. For example, when alerting customers to troubling security issues, provide plenty of details up front or in written form, rather than having a non-technical rep vaguely describe the issue over the phone. That way, customers won't end up confused and frustrated, airing dirty laundry in a public forum.
Also, perhaps there's a lesson in choosing suppliers with greater care, though I'm curious to see what the next faulty Dell motherboard does. Maybe it won't function properly if installed too snuggly.
This article, "Dell's response to motherboard malware causes confusion," was originally published at InfoWorld.com. Get the first word on what the important tech news really means with the InfoWorld Tech Watch blog.