Zoom Meeting - Privacy and Security Settings - ZoomBombing Prevention Tips

There are many features within Zoom that can increase the security of your Zoom sessions and reduce the chance of unwanted attendees from disrupting your event and causing problems. Use as many of these options as possible without impacting your meeting operations. If you are discussing any sensitive or confidential information in your meetings, these measures become that much more important. Public meetings are more exposed than NU-only meetings (using Authenticated Users only), but you can prevent someone from gaining access to your meeting or sharing inappropriate content by applying most of these recommendations.

Zoom Meeting - Privacy and Security Settings - ZoomBombing Prevention Tips

There are many features within Zoom that can increase the security of your Zoom sessions and reduce the chance of unwanted attendees from disrupting your meeting or event and causing problems or confidentiality concerns. The following are quick and easy tips and features that will add layers of security to keep unwanted guests out.


1.    Don’t Publicize Your Meeting

Only invite participants and guests directly to your meeting or event. If possible, avoid publicizing meeting links on social media or publicly available channels.

 

2.    Only Authenticated Users Can Join
To keep your meeting limited to only those with Northwestern NetIDs, enable this feature to prevent non-NU participants from joining. When configuring a meeting, check this box to limit access. This step alone will prevent most, if not all, unwanted guests from joining your meeting or event. For more information see Zoom Security - Only Authenticated Users Can Join.

 

a.    For instances where you need to invite a non-NU participant, consider adding them to your meeting or event with an Authentication Exception. For more information see Zoom - Authentication Exception (northwestern.edu).

 

3.    Enable the Waiting Room Feature
The Waiting Room allows you to control when each participant joins the meeting. Admit attendees one by one or hold all attendees in the virtual waiting room and admit them en masse. The former option (one by one) takes more effort, but it ensures that only participants can join if you specifically admit them. There are different Waiting Room Options available with more information available at 
Using Zoom's Waiting Room (northwestern.edu)

 

4.    Meeting Password
Apply a password for all of your meetings to prevent people from joining by randomly entering Zoom meeting ID's to see what they can do to interrupt a session. Nearly all Zoombombed meetings were scheduled without passwords. For more information see Meeting and webinar passcodes – Zoom Help Center.

 

5.    Immediate In-Meeting Security Features

In the event your session is infiltrated, Zoom has a Security button available at the toolbar with controls to disable multiple participant features, locking the meeting, enabling the waiting room, or all of the above via the Suspend Participant Activities option. The latter option will allow you to effectively start your meeting over with participants placed in the waiting room so you can safely re-admin invited participants. For more information see In-meeting security options – Zoom Help Center.

a.    In-Meeting Chat Controls
When you expand the chat window, the host or co-host can click on the three dots (in the lower right) to change how chat functions. To restrict comments from being visible to everyone and protecting the session, consider this change. By setting the chat to Host Only, any message sent by a participant is visible only by the host. This serves as a private way to submit questions and prevents any inappropriate language from being visible. For more information see 
Restricting screen sharing and chat in Zoom (northwestern.edu).


 

 

 

 

If you seek further guidance on securing your meeting or virtual event, please reach out at consultant@northwestern.edu.

For additional assistance please contact the IT Support Center at 847-491-4357 (1-HELP) or via email at consultant@northwestern.edu.




Keywords:zoom, meeting, recording, security, protection, controls, "zoom bombing"   Doc ID:99037
Owner:Michael C.Group:Northwestern
Created:2020-03-18 07:36 CSTUpdated:2022-09-13 18:59 CST
Sites:Northwestern
Feedback:  9   0