Deleting a connector is a task that can be used to clean up data in your environment, but it should be done with caution.
What happens to the vulnerabilities?
Deleting a connector will delete all vulnerabilities that the connector found.
What happens to the assets?
Even where all vulnerabilities for an asset are deleted due to connector deletion, the asset will remain in Cisco Vulnerability Management in an “orphaned” state. It will not receive any updates unless another connector reports the asset. These assets will stay in an “active” state until they are manually set to inactive or the global asset inactivity limit turns them to inactive.
How much time does it take to delete a connector?
Deletion time for a connector can vary depending on the number of vulnerabilities. You may see some assets/risk meters continue to show a Cisco Security Risk Score even after vulnerability deletion due to the time it takes to process all of the re-scoring.
Important: If your environment has risk meters that use search queries that reference a deleted connector, you might need to update them. If you used the connector name in your filter, ensure the re-built connector has the same name. The re-built connector will not have the same connector ID.
Comments
Please sign in to leave a comment.