The Network inventory contains by default the Deleted folder, designated for storing endpoints that you do not want to manage.
However, the Delete action has different effects on endpoints, depending on the folder they are in:
For endpoints in the Custom Groups folder:
When unmanaged endpoints are deleted, they are moved directly to the Deleted folder.
When a managed endpoint is deleted:
An uninstall client task is created.
A license seat is released.
The endpoints are moved to the Deleted folder.
You can view the uninstall client task in the Network > Tasks section. If the endpoint does not receive the task (because it is offline), the task will stay in pending for 72 hours, after which it will automatically expire.
Note
If you want to exclude permanently certain endpoints from management, you must keep them in the Deleted folder.
If you delete endpoints from the Deleted folder, they will be completely removed from theGravityZone database. Nevertheless, excluded endpoints that are online will be detected with the next Network Discovery task and they will appear in the Network Inventory as new endpoints.
For endpoints in an integration folder (Active Directory, vCenter Server, XenServer etc.):
The endpoints become unmanaged and remain in their folders (they are not moved to the Deleted folder).
A license seat is released for each endpoint.
If the endpoint is online, it will be licensed again.
To delete endpoints from the Network inventory:
Go to the Network page.
Alternately, use the Filters menu and the Depth > All items recursively option at the upper side of the table to display all entities in the Network inventory.
In the right-side pane, select the check box of to the endpoint you want to delete.
Click the
Delete button at the upper side of the table. Confirm your action by clicking Yes.
Depending on the endpoints, they will either be moved to the Deleted folder or they will only become unmanaged.
Page Menu
- Bitdefender – GravityZone
- Threats Xplorer
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Endpoint types
- Add Mailbox
- Configure Email
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Allow file download blocked by Bitdefender
- Email Security Licensing & Provisioning
- Check my monthly subscription for Bitdefender Security for AWS
- Viewing notifications
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Create reports
- Report types
- Reports
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Repair client
- Restart machine
- Features distribution
- Network discovery
- Container Protection
- Update client
- Security for Storage
- Uninstall client
- eXtended Detection and Response (XDR)
- Install
- Endpoint Risk Analytics (ERA)
- Patch tasks
- Sandbox Analyzer
- Exchange scan
- Security for Exchange
- Deleting policies
- Full Disk Encryption
- Scan
- Email Security
- Scan for IOC
- Risk scan
- Device Control
- Computer policies
- Patch Management
- Renaming policies
- Network Attack Defense
- Changing policy settings
- Content Control
- Configuring profiles
- Firewall
- Assigning policies
- Advanced Anti-Exploit
- Creating policies
- HyperDetect
- Troubleshooting
- Advanced Threat Control
- Patch tasks
- Antimalware
- Credentials Manager
- Introduction
- Best practices