Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Warninginfo
Note! These are initial recommendations and may be updated as circumstances change.


During the COVID-19 pandemic, there have been several articles about "Zoombombing" incidents, where uninvited participants join and harass the presenter and participants.  If you are concerned about this happening during one of your classes, then follow the recommendations in this article about scheduling more secure meetings and what tools you can use to during a meeting to keep it secure.

Keep your meeting information private

First and foremost, only share the joining information information about how to join the conference with your intended attendees. To the best of our knowledge, the majority of "Zoombombing" has occurred when someone has posted meeting information in a public setting.  Direct Secure ways of inviting members to your meeting are by using direct calendar invitations, emails to attendees, or invitations sent through Canvas are good ways of inviting members to your meeting.

Scheduling a more secure meeting 

Complete details on scheduling Zoom meeting meetings are available at this link.  This section focuses only on security settings when initially scheduling a meeting.The two screen shots below highlight the recommended settings to use when scheduling a more secure Zoom meeting. 

Scheduling meetings can be accomplished from both the Desktop Zoom client or from the Web Zoom interface, both are depicted below.  Brief . The recommended settings to use when scheduling a secure Zoom meeting are highlighted in the images below, with brief explanations of the settings follow the screenshotsfollowing.


Desktop Zoom Client:

Schedule using Zoom Desktop

                                      


Web Zoom interface:

Web Zoom interfaceImage Added



Meeting ID

  • Select Generate Automatically
Click on this option to
  •  
  • This option will auto-generate your Meeting ID
when scheduling a meeting
  • . We do
not
  • NOT recommend using a Personal Meeting ID
at
  •  at this time.  Think of it as similar to giving out your phone number
,
  • : share it with only with people you trust.

Password 

  • SelectRequire meeting password  
Click on this option to add
  • This option adds a layer of access protection to your meeting.
  
To

Advanced Options / Meeting Options

  • SelectEnable waiting room

  Click on this option to allow you to manually grant access to a meeting from
  •   

    • This option adds potential meeting participants to a waiting room

.  As meeting host
    • , lets you

can
    • see

who is awaiting access to the meeting and grant or deny them access (see Management Participants
    • those who are waiting, and allows you to manually grant access to people in the waiting room (see the Manage Participants section below).  A one minute video

of
    • on how to use the waiting room

feature Join before host.  We do not recommend using this feature.  This ensures that nobody is in your meeting
  • Deselect Enable join before host

    • This feature is not recommend! If this feature is enabled, there may be unwanted attendees waiting to surprise you when you join your meeting.

     
    •    

    • More details, including how to make this

setting
    • your default setting for future meetings, can be found in

the

Web Zoom interface:

Web Zoom interfaceImage Removed

Updating an existing meeting's security settings

  • The above settings will not impact meetings that you've already scheduled. For instructions on applying these settings to an existing meeting, refer to the
information found at this link.Please note:
  • information on Updating a Scheduled Meeting.
  • Note!  After you have made changes to setting for your meetings, you may need to resend meeting details to your participants
after making changes
  • .

Security settings while in a meeting

Meeting
  • When you are already in a meeting, setting controls are located in a
pop up
  • menu bar along the bottom of your screen
while in a meeting
You may need to move your mouse
  • Move your cursor to the bottom of the Zoom window to make this menu appear. 
Also, note that menu items and controls are more visible if you maximize
  • Maximize your meeting window
(
  • , or make full screen
) - otherwise you may have to look for and click
  • , to make menu items and controls more visible. Clicking on an ellipsis labeled
more to see all controls mentioned here
  • "More" also opens these controls.
  • Participant management and Security controls are available to use at anytime during a meeting via the meeting controls menu - without having to leave the meeting window.
  The two controls are labeled
  •   

Manage Participants (

look for a

two heads

/busts

icon)

and Security (look for a shield icon).

Manage Participants 

We recommend clicking and opening

Open this control (or press Alt-U) during a meeting - especially at the beginning

.  From this window, you can

- to see who is in the waiting room, grant or deny access, mute and unmute participants, enable and restrict chatting features, remove participants from a meeting, and more. 

Security Menu (shield icon)

The Security Menu can be used anytime during a meeting

(look for a shield icon labeled Security) to help secure your meeting. Clicking on it pops up a small menu with

, and gives you several options that you can turn on and off. 

Click on the operative phrase in the menu to turn it on; a

Each feature is activated when you see a

tick

check mark next to it:

    • Lock Meeting 

  •  This
    •  This is used to lock out anybody not already in the meeting.  Use this carefully as you may inadvertently lock someone out who has left and is trying to rejoin (e.g., to try and establish a better connection), or if someone is late they may not be able to join in.  Should someone try to join after the meeting is locked, then you can still admit them via the waiting room (see Manage Participants above).  

    • Enable waiting room  This feature allows you to grant or deny access into your meeting, without interrupting the meeting itself.  The waiting room appears at the top of the Participants window (see Manage Participants above).
    • Share Screen When activated, this feature allows participants to share their screens with everyone in your meeting.  If sharing screens (other than your own) is not warranted, make sure there is not a tick next to this security feature.  Alternatively, if there are things for participants to share, make sure there is a tick next to this feature.
    • Chat When
  • ticked
    • activated, this feature allows participants to chat with each other and/or with the entire meeting group.  Restrictions on chatting during a meeting are controlled in the Participants window (see Manage Participants above).
    • Rename Themselves When
  • ticked
    • activated, this allows attendees to change the name that is used to identify themselves in the participant list and in the video thumbnail windows.  Turning this off makes it harder for participants to hide behind monikers, but it also leaves attendees being stuck with their registered names, or listed as a phone number if they join by phone.  

Regarding phone participants

If you have people joining via phone, we recommend you ensure that they verbally identify themselves as soon as they join and prior to continuing your meeting.  Once they identify themselves, you as host have the option of renaming them via the Manage Participant's menu (see above).  Renaming them labels them with a name and not just a number during the meeting. Please contact canvas_help@whitman.edu if you'd like assistance adding a passcode for phone participants.


As always, please contact Whitman College Technology Services if you have questions or concerns about your online applications security or usage.