The article offers a patch, which does remediate the vulnerability, but since the software is no longer in our environment, we'd like an official way to just remove those files silently from the endpoints, instead of updating them. Has anyone dealt with the removal of the FlexNet Connect Update service before?
For reference, the Qualys remediation lists the following
"The vulnerable .dll file associated with this vulnerability may not be accessible through Windows Explorer. This is caused by isusweb.dll being a hidden file. To verify the existence of the .dll file, manual navigation to the directory via the command prompt is necessary.
%WINDIR%\Downloaded Program Files\isusweb.dll found %WINDIR%\Downloaded Program Files\isusweb.dll Version is 220.127.116.11146"