Introduction
Micro Widgets, Incorporated, having recently completed the upgrade process from Microsoft Windows Server 2008 to Microsoft Windows Server 2012 and the implementation of a patch management solution, wants to extend the capabilities of their Microsoft Windows Server 2012 environment. Currently, mwi.com lives on a third party hosted server. While this was the proper solution while company was in its infancy, it no longer fits within the organizational plan. This proposal will address the process for hosting mwi.com on a Microsoft Windows Server 2012 server internally. The proposal will also address securing the web server and website. This proposal will also address name resolution for the corporate offices and the ten remote locations.
Hosted Website
Because mwi.com lives in a hosted environment, the corporate website frequently appears offline to our customers and employees alike. Server resources within the shared environment are not always available for the mwi.com website but for other websites living within the shared environment. Making the move to bring the website home and host it on a Server 2012 server, Micro Widgets, Incorporated can take advantage of the fact that “Windows Server 2012 offers a high-density, highly scalable environment that can be modified to perform at the optimum level based on the needs of the business” (Secura, 2013). Once moved, mwi.com will live in an environment where server resources will exist solely to support mwi.com.
Self Hosted Website
In order to move mwi.com into the Micro Widgets, Incorporated environment, a Microsoft Windows Server 2012 server that meets the requirements for hosting a website needs implementation within the environment. After installing Server 201...
... middle of paper ...
...hapter 16 Securing your web server. Retrieved from http://msdn.microsoft.com/en-us/library/ff648653.aspx
Microsoft. (2012). Build a static website on IIS. Retrieved from http://technet.microsoft.com/en-us/library/hh831515.aspx
Microsoft. (2014). Planning DNS servers. Retrieved from http://technet.microsoft.com/en-us/library/cc732715.aspx
Mitchell, B. (2014). DNS - Domain name system. Retrieved from http://compnetworking.about.com/cs/domainnamesystem/g/bldef_dns.htm
Rosato, R. (2014). Best practices for applying service packs, hotfixes and security patches. Retrieved from http://technet.microsoft.com/en-us/library/cc750077.aspx
Rouse, M. (2007). DMZ (Demilitarized zone). Retrieved from http://searchsecurity.techtarget.com/definition/DMZ
Secura. (2013). Windows Server 2012 hosting. Retrieved from http://www.securahosting.com/cloud-hosting/windows-server-2012-hosting/
Andrews, J. (2010). A+ guide to managing and maintaining your PC (7th ed.). Boston, MA: Cengage Learning.
I encountered several challenges which helped further my understanding of systems administration. The two tasks which I learned the most form where deploying the RHEL7 server, installing the Wiki and configuring my Opsview server. When installing the RHEL7 server, I made sure not to install the bare bones version of the OS, thus ensuring resources like a GUI would be available to me. However when I went to install the Wiki software, I realized that I should have chosen one of the other install configurations. Essentially, the version I had installed did not have any of the basic software suites that are commonly used to host websites on Linux servers. In the end I had to install Apache, Mariadb, and php before attempting to install the Wiki software. The next thing I learned was how to install and configure MediaWiki, which is the Wiki solution I have chosen to deploy. On specific issue I encountered was getting the HTTP traffic to my RHEL7 server to default to the main page of the Wi...
Also, implement patch management and keep up to date with anti-malware and anti-spyware updates. This helps in the summarization of the possible threats the College can face in certain scenarios and explains how to protect against them.
4. Server hardening – Request copies for your hosting company’s server hardening steps. This will detail the process of how they apply their measures for security to your servers.
Some of technology they will need to decide on will be whether to install a server computer, which is a computer on a network that performs important network functions for client computers, such as serving up Web pages, storing data, and storing the network operating system (and hence controlling the network). Server software such as Microsoft Windows Server, Linux, and Novell Open Enterprise Server are the most widely used network operating systems. As well the network operating system (NOS) routes, manages communications on the network, and coordinates network resources. It can reside on every computer in the network, or it can reside primarily on a dedicated server computer for all the applications on the network. In considering how their workers will communicate with each other in...
National Institute of Standards and Technology (NIST): Risk Management Guide for Information Technology Systems. Special Publication 800-30, 2002.
eMILPO uses webservers and application servers as part of the hardware to run this system. The system uses Dell servers running Microsoft Windows 2000 Advanced Server or Microsoft Windows Enterprise Server. The software that the eMILPO System uses to run their web application and the servers that are u...
At this point the quantity of servers can be easily increased if distinctive physical servers are used by each business division's development team. Reconfiguring development and the test environments can consume time when physical servers are shared by teams.
Johansson, Jesper M. "Managing the Windows Vista Firewall." TechNet 2008: n. pag. Web. 14 Nov. 2013. http://technet.microsoft.com/en-us/magazine/2008.06.security.aspx
Providing Full-Text Access to Eric Digest. n.p. 2003. The 'Secondary' of the 'Secondary' of the Web. The Web. The Web.
As electronic commerce, online business-to-business operations, and global connectivity have become vital components of a successful business strategy, enterprises have adopted security processes and practices to protect information assets. But if you look at today's computing environments, system security is a horrible game of numbers: there are currently over 9,223 publicly released vulnerabilities covering known security holes in a massive range of applications from popular Operating Systems through to obscure and relatively unknown web applications. [01] Over 300 new vulnerabilities are being discovered and released each month. Most companies work diligently to maintain an efficient, effective security policy, implementing the latest products and services to prevent fraud, vandalism, sabotage, and denial of service attacks. But the fact is you have to patch every hole of your system, but an attacker need find only one to get into your environment. Whilst many organisations subscribe to major vendor's security alerts, these are just the tip of the security iceberg and even these are often ignored. For example, the patch for the Code Red worm was available some weeks before the worm was released. [02]
The Web. The Web. 6 Nov. 2013. “Multitasking.” Encyclopedia of Small Businesses.
Huang G.Q. & Zhao J.B. 2006. Do It Yourself (DIY) portalets for developing e-business solutions for small and medium enterprises
PHP is a scripting language that executes scripts on a server, which allows it to create dynamic web pages. To create a dynamic web page, PHP interprets the code on the web server with a Hypertext Preprocessor Module. As an open source language, PHP is functional across multiple platforms. According to Free Servers, it can be run on Linux, Mac OS, Microsoft Windows and many variations of the Unix system. (Free Servers. “What is PHP”). A Hypertext Preprocessor Module is the PHP’s CGI. A Common Gateway Interface is the standard method that Web Servers utilise when passing a Web User Request to an application program and returning data. As it was developed for the web, it has the capability to be embedded into HTML code.
Web hosting means you make your website accessible to anyone on the internet at any time (24/7). “Web hosting refers to a service that makes your website available to your users.” (quackit, 2014)Web hosting services are usually full of data and information that you wish to access. They contain links to millions of sights that will help you find the information you need. An example of this is Google. Web hosts usually share a server with many other sites. Paid web hosting is when you pay to run your server and don’t have adverts on your site. The benefits of paid web hosting are that there aren’t any pop-ups or adverts that the users using your site would find annoying. Also, there is more user dependency because they would be subscribed to the website and would feel obligated to go back (like Twitter for example). The costs to the organisation is that if there are many ads and pop-ups it would reduce the professionalism of the website and ruin the image you want to portray.