Solved

Hosting Company website and intranet?

Posted on 2013-01-22
1
353 Views
Last Modified: 2013-02-12
Hi guys,

The company that I work for has already a website hosted in a web server (Windows 2003 standard ) located in DMZ and intranet hosted on a different server (windows 2003 standard) located internally. There will be more modifications on the intranet site as we are using Drupel and also it will be hosted in the new server. Later on we will also migrate the webserver to a new server. The new servers will be in a virtual environment (VMware 5).

I want to know different ways of securing intranet and our company website. Can I suggest to have 2 different servers as how its hosted currently?

Intranet - local to the network (internal network)
Company Website - In the DMZ

Any suggestions is much appreciated
0
Comment
Question by:arkr12
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 10

Accepted Solution

by:
ddiazp earned 500 total points
ID: 38808382
You should be ok with having both servers on the same VM.

One thing you need to make sure of, is that each site is binded to its own IP address (intranet on 10.1.1.2 and corporate on 10.1.1.3 for example).

That will give you all you need to apply different security policies for both sites.

If you're running that new server on linux you could jail the 2 environments to completely isolate them from everything else, make sure you use different databases, database credentials, service accounts for each site.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
What You Need to Know when Searching for a Webhost Provider
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question