The Network inventory contains by default the Deleted folder, designated for storing endpoints that you do not want to manage.
However, the Delete action has different effects on endpoints, depending on the folder they are in:
For endpoints in the Custom Groups folder:
When unmanaged endpoints are deleted, they are moved directly to the Deleted folder.
When a managed endpoint is deleted:
An uninstall client task is created.
A license seat is released.
The endpoints are moved to the Deleted folder.
You can view the uninstall client task in the Network > Tasks section. If the endpoint does not receive the task (because it is offline), the task will stay in pending for 72 hours, after which it will automatically expire.
Note
If you want to exclude permanently certain endpoints from management, you must keep them in the Deleted folder.
If you delete endpoints from the Deleted folder, they will be completely removed from theGravityZone database. Nevertheless, excluded endpoints that are online will be detected with the next Network Discovery task and they will appear in the Network Inventory as new endpoints.
For endpoints in an integration folder (Active Directory, vCenter Server, XenServer etc.):
The endpoints become unmanaged and remain in their folders (they are not moved to the Deleted folder).
A license seat is released for each endpoint.
If the endpoint is online, it will be licensed again.
To delete endpoints from the Network inventory:
Go to the Network page.
Alternately, use the Filters menu and the Depth > All items recursively option at the upper side of the table to display all entities in the Network inventory.
In the right-side pane, select the check box of to the endpoint you want to delete.
Click the
Delete button at the upper side of the table. Confirm your action by clicking Yes.
Depending on the endpoints, they will either be moved to the Deleted folder or they will only become unmanaged.
Page Menu
- Bitdefender – GravityZone
- Report types
- Repair client
- Reconfigure client
- Configuration
- Operation
- Operation
- Best practices
- Viewing and managing scheduled reports
- Announcements
- Executive Summary
- Reports
- Restart machine
- Create reports
- Deleting notifications
- Configuring notification settings
- Taking report-based actions
- Saving reports
- Emailing reports
- Printing reports
- Notifications
- Notification types
- Viewing notifications
- Risk scan
- Best practices
- Credentials Manager
- Patch tasks
- Troubleshooting
- Creating policies
- Assigning policies
- Configuring profiles
- Changing policy settings
- Renaming policies
- Computer policies
- Check my monthly subscription for Bitdefender Security for AWS
- Scan for IOC
- Scan
- Deleting policies
- Exchange scan
- Patch tasks
- Install
- Uninstall client
- Update client
- Network discovery
- Patch Management
- Deleting endpoints
- Threats Xplorer
- Introduction
- Antimalware
- Advanced Threat Control
- HyperDetect
- Advanced Anti-Exploit
- Firewall
- Content Control
- Network Attack Defense
- Using Recovery Manager for encrypted volumes
- Device Control
- Email Security
- Full Disk Encryption
- Security for Exchange
- Sandbox Analyzer
- Endpoint Risk Analytics (ERA)
- eXtended Detection and Response (XDR)
- Security for Storage
- Container Protection
- Endpoint types
- Email Security Licensing & Provisioning
- Install Security Server through Control Center
- Install security agents – standard procedure
- Install Security Server manually
- AD Connect
- Bitdefender Endpoint Security Tools for Linux quick start guide
- Install security agents – use cases
- Whitelist Email
- Configure Email
- Add Mailbox
- Features distribution
- Network inventory
- Checking the endpoints status
- Viewing endpoint details
- Organizing endpoints into Groups
- Sorting, filtering and searching for endpoints
- Viewing and managing tasks
- Running tasks
- Creating quick reports
- Assigning policies