Fixlets - broken urls

lately i’ve been seeing a lot of fixlets with broken urls (older fixlets from 2010,2011,2012). The version of my external site (Patches for Windows) is up to date (3,661). Will these be updated or are they no longer being supported?

MS10-019: Vulnerabilities in Windows Could Allow Remote Code Execution - Cabinet File Viewer Shell Extension 6.1 - Windows Server 2008 R2 (x64)
MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows Server 2008 R2 (x64)
MS10-043: Vulnerability in Canonical Display Driver Could Allow Remote Code Execution - Windows Server 2008 R2 (x64)
MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege - Windows Server 2008 R2 (x64)
MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows Server 2008 R2 Gold (x64)
MS10-074: Vulnerability in Microsoft Foundation Classes Could Allow Remote Code Execution - Windows Server 2008 R2 (x64)
MS10-076: Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2008 R2 (x64)
MS10-081: Vulnerability in Windows Common Control Library Could Allow Remote Code Execution - Windows Server 2008 R2 (x64)
MS10-083: Vulnerability in COM Validation in WordPad Could Allow Remote Code Execution - Windows Server 2008 R2 (x64)
MS10-092: Vulnerability in Task Scheduler Could Allow Elevation of Privilege - Windows Server 2008 R2 (x64)
MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows Server 2008 R2 Gold(x64)
MS10-100: Vulnerability in Consent User Interface Could Allow Elevation of Privilege - Windows Server 2008 R2 (x64)
MS11-011: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold (x64)
MS11-013: Vulnerabilities in Kerberos Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64)
MS11-017: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution - Remote Desktop Connection 7.0 Client - Windows Server 2008 R2 Gold (x64)
MS11-019: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64)
MS11-037: Vulnerability in MHTML Could Allow Information Disclosure - Windows Server 2008 R2 Gold/SP1 (x64)"
MS11-042: Vulnerabilities in Distributed File System Could Allow Remote Code Execution - Windows Server 2008 R2 Gold (x64)"
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows Server 2008 R2 Gold (x64) (v2, republished 8/9/2011)"
MS11-048: Vulnerability in SMB Server Could Allow Denial of Service - Windows Server 2008 R2 Gold/SP1 (x64)"
MS11-071: Vulnerability in Windows Components Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64)"
MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 R2 Gold (x64)"
MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Server 2008 R2 Gold/SP1 (x64)"
MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 R2 Gold (x64)"
MS12-009: Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold (x64)“
MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64)”

With Windows Server 2008 R2 falling out of support in January 2020, it appears that Microsoft has stopped hosting these patch files. I searched for a few, but they all led to Microsoft pages saying “We’re sorry, this download is no longer available.” There’s simply no non-broken URL for BigFix to use. The files are gone.

You’ll really want to get your servers upgraded to a supported version of Windows Server as soon as possible.

I’ve noticed that a bunch of Office related fixlets (many are still relevant) have this same issue.

Is there a way to find a fixlets that no longer have a valid URL so they can be hidden globally?