It looks to me like the Patches for RHEL 7 EUS site includes everything from "Patches for RHEL 7" that was not superseded at the time RHEL 7 went Extended. So...I think probably any single machine should only be subscribed to the standard or to the Extended support site?
If that were the case, any machine subscribed to the EUS site should filter out the Superseded fixlet, and won't show the non-ESU fixlet because it's not subscribed to that site; and any machine that is not entitled for EUS support, should subscribe to the normal site, and should be flagged for that missing patch?
Incoming Rant
But also, I think this example brings up something that's a real danger in the way that things get reported in BigFix and is often overlooked.
If we ignore things that are Superseded (which is the default!), then we cannot tell how far out of compliance any given machine is. In most cases, any given patch will be superseded by another. When we ignore Superseded patches, once a new patch is released, we can only report that our machine is missing the newest patch; we cannot tell if our machine is one day behind, or three years behind, because everything between yesterday's patch and three years ago was superseded and ignored.
Here you're demonstrating a three-year-old patch, where you want to hide it from view because it's superseded and the user shouldn't install it, they should install the latest thing instead. A reasonable approach, from the viewpoint of least-effort for the user - they need not install this fixlet, they only need to install the latest version, and ignore the superseded things.
But, this ignores the fact that the user hasn't gotten around to installing this fixlet, or the things that superseded it earlier, for the last three years.
They didn't install 23333301 when it was released in May 2023.
They didn't install 24494301 that superseded it in July 2024.
They didn't install 24710101 that superseded that in September 2024.
They didn't install 25149971 that superseded that in September 2025.
At this point, you'd ask them to install 26007501 which was released in January 2026 and supersedes all of these previous ones; but if they wait a few more months you'll hide this one as well, and only tell them about the latest-and-greatest fixlet they're missing. In the meantime though, in the shortest display you'd show their system is missing a patch from January, not the patch that was released three years ago to which they're still vulnerable.
So, my advice would be -- handle with care. I think it's a really small edge case where, if the customer was keeping up with patching, there might be a small overlap where the same fixlet is relevant from both sites; that edge case goes away when they apply any of the superseding fixlets from the EUS site.
But if that edge case never goes away, because they aren't applying any of the patches, then put them on blast and show every missing thing they have.
When I look at compliance reporting, I turn on Superseded Evaluation so all the old fixlets show relevant, and report every one of them. Any external auditor would do the same.
But if you really, really want to not show the fixlet from the old site...just unsubscribe the computer from the site. Only leave them subscribed on the EUS site.