Network isolation is crucial, but as the community mentioned, applying host-based hardening directly on the legacy machines adds a necessary secondary layer of defense.
Without Hexnode to automate these configurations, you will need to perform a Manual Standard Operating Procedure (SOP) on each Windows 7/8 unit. In addition to @skylar ‘s tip about local admin rights and USBs, here are the primary steps you should take:
1. Disable SMBv1: Legacy systems are highly susceptible to ransomware propagation via SMBv1. Open the command prompt as an administrator and run: dism /online /disable-feature /featurename:SMB1Protocol
2. Remove Non-Essential Services: Reduce the attack surface by disabling any service that the legacy application does not strictly need to run. Common candidates include the Print Spooler, Remote Registry, and NetBIOS over TCP/IP.
3. Configure a Local AppLocker Policy: Use the Local Security Policy editor on the machine to configure AppLocker. Restrict executables so that only the specific legacy industrial application is permitted to run.
Maintenance & Sunset Plan: Keep in mind that sandboxing is a temporary risk-mitigation strategy. We recommend:
-
VDI Evaluation: If hardware connections allow it, see if the legacy app can be migrated to a Windows 10/11 virtual machine running in “Compatibility Mode,” which would allow it to be brought under Hexnode management.
(Disclaimer: Always test these configurations, like disabling SMBv1, in a staging environment first, as legacy industrial software sometimes relies on older, insecure protocols to function!)