I believe that best practices would say:
- Audit tag as appropriate
- Add comment that they were removed
- Suppress the vulnerabilities.
You can do this quickly by "grouping by" source file, multiselecting, then Tag/Comment/Suppress all at one time.
Actually removing vulnerabilities would break the history audit trail.