SlideShare a Scribd company logo
Page 1 of 16
dated April 12, 2020
Advisory on Secure use of Zoom meeting platform by
private individuals (not for use by government
offices/officials for official purpose)
Zoom is a not a safe platform and advisory of cert-in on the
same dated Feb 06, 2020 and March 30, 2020 may kindly be
referred. These advisories are available on Cert-In website.
2. Those private individuals who still would like to use Zoom
for private purpose may kindly follow the following guidelines.
3. Broad objective of this document is to enable/disable certain
settings is to:
 prevent unauthorised entry in the conference room
 prevent an authorised participant to carry out malicious on
the terminals of other in the conference.
 Avoid DOS attack by restricting users through passwords
and access grant.
4. Most of the settings can be done by login into users zoom
account at website, or installed application at PC/Laptop/Phone
and also during conduct of conference. However certain settings
are possible through certain mode/channel only. For example,
lock meeting can be enabled by administrator only when the
meeting has started. This documents explains in details all the
security configuration through website, App and through console
during the conduct of conference
Page 2 of 16
Objective of security configurations:
1. Setting new user ID and password for each meeting
2. Enabling waiting Room, so that every user can enter only
when host conducting meeting admits him
3. Disabling join before host
4. Allowing Screen Sharing by host Only
5. Disabling “Allow removed participants to re-join”
6. Restricting/disabling file transfer option (if not required)
7. Locking meeting, once all attendees have joined
8. Restricting the recording feature
9. To end meeting (and not just leave, if you are administrator)
Page 3 of 16
Section 1: Security Configuration Through website
1. Logging into zoom Website: https://zoom.us/ by entering your
account credentials
2. After login, page looks like this. Three important and useful links
are shown in red boxes, profile, setting and personal meeting ID
3. Click profile-> edit button in front of personal meeting ID shown
in above diagram and un-check the box shown below and click
save changes.
Page 4 of 16
4. Click the setting on home page and keep on scrolling down the
window and make necessary configuration as shown in figures
below. Only important ones are marked in red boxes and others
could be anything
Page 5 of 16
Page 6 of 16
Page 7 of 16
Page 8 of 16
Page 9 of 16
Section 2: Security Configuration Through App
1. Zoom meeting App when launched look like this:
2. Update your App: First and fore most important thing is to
update your Zoom App:
 click menu -> navigate to check for update -> click
Page 10 of 16
3. Set a password for personal meeting ID and enable waiting
 click edit in meeting as shown below
 Check password box, enter a strong password, check
enable waiting window etc. desirable settings are shown in
red boxes and click save
Page 11 of 16
4. Avoid conducting meeting by using Personal Meeting ID
(PMI).
Clicking on start as shown below will start a meeting with
personal meeting ID and password set by user as shown
above. In this case PMI: 3452161630 and password: Sc@3Q*
Problem in suing personal meeting ID is that with PMI and
password is fixed. It does not automatically change with every
new meeting.
5. Conduct a new meeting with randomly generated ID and
password instead of fixed one as shown above
 Click on home
Page 12 of 16
 Click New Meeting drop down as shown below
 Un-check use My Personal Meeting ID (PMI), if not already done
Page 13 of 16
 Click new meeting icon to start a new meeting
 Once Meeting has started, you will see your meeting ID and
password by clicking left top icon below. it will be random and
change with every new meeting.
Page 14 of 16
6. Scheduling a meeting with randomly generated ID and
password
 Click schedule as shown below
 The window as shown below will open up
Page 15 of 16
 After clicking advanced Options shown in above window
following expansion will open and do setting as shown below.
6. Lock the meeting session, once all attendees have joined
 Once meeting is in progress, control bar looks like this
 Click Security and click on Lock Meeting, if all your
participants have joined. you can enable waiting room from
here also. you can also disable share screen by users from
here
Page 16 of 16
Miscellaneous tips:
 Don't use your personal meeting Id (PMI) to host event,
instead use randomly generated meeting IDs for each
event.
 Don't share your link on public platform, instead share
randomly generated meeting id and password for every new
meeting session/schedule. It makes it much secure and
difficult to leak.
 If you are admin, remember to end meeting, dont just leave
meeting.
 Sign out of your account when not in use
Disclaimer: Information provided here is based on open
source without warranty of any kind.
*******
Cycord Support Team
E-mail: cycordsupport.mha@gov.in
Land Line: 011- 26531614, 011-26510245
whatsapp: +917292045198
Website: www.cycord.gov.in

More Related Content

What's hot

Tips to remove contradeplatform
Tips to remove contradeplatformTips to remove contradeplatform
Tips to remove contradeplatform
MU
 
Remove chromium from computer
Remove chromium from computerRemove chromium from computer
Remove chromium from computer
haroNaroum
 
How to enable admin account w10 pureinfotech
How to enable admin account w10 pureinfotechHow to enable admin account w10 pureinfotech
How to enable admin account w10 pureinfotech
Darnette A
 
Complete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pcComplete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pc
haroNaroum
 
Epa remote gfe 1
Epa remote  gfe 1Epa remote  gfe 1
Epa remote gfe 1
Darnette A
 
WINDOWS 10
WINDOWS 10WINDOWS 10
WINDOWS 10
Dave Umberger
 
2015 MMLA IT Handbook
2015 MMLA IT Handbook2015 MMLA IT Handbook
2015 MMLA IT Handbook
Belal Bahader
 
Polycom cx5000 quick_reference_card
Polycom cx5000 quick_reference_cardPolycom cx5000 quick_reference_card
Polycom cx5000 quick_reference_card
zahidgiz
 
Ways to remove startpage home.com
Ways to remove startpage home.comWays to remove startpage home.com
Ways to remove startpage home.com
haroNaroum
 
How to uninstall constant fun from computers
How to uninstall constant fun from computersHow to uninstall constant fun from computers
How to uninstall constant fun from computers
haroNaroum
 
Get rid of ads by muzik fury in detailed steps
Get rid of ads by muzik fury in detailed stepsGet rid of ads by muzik fury in detailed steps
Get rid of ads by muzik fury in detailed steps
haroNaroum
 
How to remove presto savings
How to remove presto savingsHow to remove presto savings
How to remove presto savings
MU
 
Tips to uninstall Unisales
Tips to uninstall Unisales Tips to uninstall Unisales
Tips to uninstall Unisales
Adoniscooper
 
Remove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virusRemove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virus
jesicasruma
 
Uninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.coUninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.co
haroNaroum
 
Best way to remove mystart.com virus
Best way to remove mystart.com virusBest way to remove mystart.com virus
Best way to remove mystart.com virus
jesicasruma
 
Ways to remove searchinme.com
Ways to remove searchinme.comWays to remove searchinme.com
Ways to remove searchinme.com
haroNaroum
 
Module Skype
Module SkypeModule Skype
Module Skype
Ira Raji
 
How to remove Trojan.Mirai
How to remove Trojan.MiraiHow to remove Trojan.Mirai
How to remove Trojan.Mirai
deniallorance65
 
Eikon3 getting startedguide_v1.1
Eikon3 getting startedguide_v1.1Eikon3 getting startedguide_v1.1
Eikon3 getting startedguide_v1.1
Eldaw Ali Yousif
 

What's hot (20)

Tips to remove contradeplatform
Tips to remove contradeplatformTips to remove contradeplatform
Tips to remove contradeplatform
 
Remove chromium from computer
Remove chromium from computerRemove chromium from computer
Remove chromium from computer
 
How to enable admin account w10 pureinfotech
How to enable admin account w10 pureinfotechHow to enable admin account w10 pureinfotech
How to enable admin account w10 pureinfotech
 
Complete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pcComplete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pc
 
Epa remote gfe 1
Epa remote  gfe 1Epa remote  gfe 1
Epa remote gfe 1
 
WINDOWS 10
WINDOWS 10WINDOWS 10
WINDOWS 10
 
2015 MMLA IT Handbook
2015 MMLA IT Handbook2015 MMLA IT Handbook
2015 MMLA IT Handbook
 
Polycom cx5000 quick_reference_card
Polycom cx5000 quick_reference_cardPolycom cx5000 quick_reference_card
Polycom cx5000 quick_reference_card
 
Ways to remove startpage home.com
Ways to remove startpage home.comWays to remove startpage home.com
Ways to remove startpage home.com
 
How to uninstall constant fun from computers
How to uninstall constant fun from computersHow to uninstall constant fun from computers
How to uninstall constant fun from computers
 
Get rid of ads by muzik fury in detailed steps
Get rid of ads by muzik fury in detailed stepsGet rid of ads by muzik fury in detailed steps
Get rid of ads by muzik fury in detailed steps
 
How to remove presto savings
How to remove presto savingsHow to remove presto savings
How to remove presto savings
 
Tips to uninstall Unisales
Tips to uninstall Unisales Tips to uninstall Unisales
Tips to uninstall Unisales
 
Remove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virusRemove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virus
 
Uninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.coUninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.co
 
Best way to remove mystart.com virus
Best way to remove mystart.com virusBest way to remove mystart.com virus
Best way to remove mystart.com virus
 
Ways to remove searchinme.com
Ways to remove searchinme.comWays to remove searchinme.com
Ways to remove searchinme.com
 
Module Skype
Module SkypeModule Skype
Module Skype
 
How to remove Trojan.Mirai
How to remove Trojan.MiraiHow to remove Trojan.Mirai
How to remove Trojan.Mirai
 
Eikon3 getting startedguide_v1.1
Eikon3 getting startedguide_v1.1Eikon3 getting startedguide_v1.1
Eikon3 getting startedguide_v1.1
 

Similar to Advisory on Zoom video meeting platform by Ministry of Home Affairs (MHA) of India

Support article1224
Support article1224Support article1224
Support article1224
Breanna.org
 
Online HousingSocietyManagement
Online HousingSocietyManagementOnline HousingSocietyManagement
Online HousingSocietyManagement
Echo
 
How to install_comodo_free_internet_security
How to install_comodo_free_internet_securityHow to install_comodo_free_internet_security
How to install_comodo_free_internet_security
William hendric
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodo
William hendric
 
Using voice to_input_data_in_microsoft_dynamics_crm
Using voice to_input_data_in_microsoft_dynamics_crmUsing voice to_input_data_in_microsoft_dynamics_crm
Using voice to_input_data_in_microsoft_dynamics_crm
aegisisccanada2
 
Join.me basics
Join.me basicsJoin.me basics
Join.me basics
Emerita Salvador
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPT
William hendric
 
Microsoft Teams - User Guide Presentation
Microsoft Teams - User Guide PresentationMicrosoft Teams - User Guide Presentation
Microsoft Teams - User Guide Presentation
SubhashDebnath5
 
Mazenet Technologies-Tally
Mazenet Technologies-TallyMazenet Technologies-Tally
Mazenet Technologies-Tally
Mazenetsolution
 
Windows defender di windows 8 tidak bisa scan error
Windows defender di windows 8 tidak bisa scan  errorWindows defender di windows 8 tidak bisa scan  error
Windows defender di windows 8 tidak bisa scan error
Angling Darma
 
Windows defender di windows 8 tidak bisa scan error
Windows defender di windows 8 tidak bisa scan  errorWindows defender di windows 8 tidak bisa scan  error
Windows defender di windows 8 tidak bisa scan error
Angling Darma
 
Comodo SecureBox Management Console – Quick Start Guide
Comodo SecureBox Management Console – Quick Start GuideComodo SecureBox Management Console – Quick Start Guide
Comodo SecureBox Management Console – Quick Start Guide
Riya Dey
 
How to install Microsoft Teams Android app
How to install Microsoft Teams Android appHow to install Microsoft Teams Android app
How to install Microsoft Teams Android app
Chris Slemp
 
Linked in security update
Linked in security updateLinked in security update
Linked in security update
Maggie Zerkus
 
Adding a User and Project to RD Apply
Adding a User and Project to RD ApplyAdding a User and Project to RD Apply
Adding a User and Project to RD Apply
Lincoln Stanley
 
Zoom basic Setup | Module
Zoom basic Setup | ModuleZoom basic Setup | Module
Zoom basic Setup | Module
Niva tharan
 
Installation and authorization manual
Installation and authorization manualInstallation and authorization manual
Installation and authorization manual
Guilherme W.:Rodolfo
 
15 things you should know about BA (En)
15 things you should know about BA  (En)15 things you should know about BA  (En)
15 things you should know about BA (En)
BeAnywhere
 
WorkShop Presentation
WorkShop PresentationWorkShop Presentation
WorkShop Presentation
Seana Shoecraft
 
Zoom Meeting Etiquettes and Best Practices
Zoom Meeting Etiquettes and Best PracticesZoom Meeting Etiquettes and Best Practices
Zoom Meeting Etiquettes and Best Practices
TariqulBari2
 

Similar to Advisory on Zoom video meeting platform by Ministry of Home Affairs (MHA) of India (20)

Support article1224
Support article1224Support article1224
Support article1224
 
Online HousingSocietyManagement
Online HousingSocietyManagementOnline HousingSocietyManagement
Online HousingSocietyManagement
 
How to install_comodo_free_internet_security
How to install_comodo_free_internet_securityHow to install_comodo_free_internet_security
How to install_comodo_free_internet_security
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodo
 
Using voice to_input_data_in_microsoft_dynamics_crm
Using voice to_input_data_in_microsoft_dynamics_crmUsing voice to_input_data_in_microsoft_dynamics_crm
Using voice to_input_data_in_microsoft_dynamics_crm
 
Join.me basics
Join.me basicsJoin.me basics
Join.me basics
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPT
 
Microsoft Teams - User Guide Presentation
Microsoft Teams - User Guide PresentationMicrosoft Teams - User Guide Presentation
Microsoft Teams - User Guide Presentation
 
Mazenet Technologies-Tally
Mazenet Technologies-TallyMazenet Technologies-Tally
Mazenet Technologies-Tally
 
Windows defender di windows 8 tidak bisa scan error
Windows defender di windows 8 tidak bisa scan  errorWindows defender di windows 8 tidak bisa scan  error
Windows defender di windows 8 tidak bisa scan error
 
Windows defender di windows 8 tidak bisa scan error
Windows defender di windows 8 tidak bisa scan  errorWindows defender di windows 8 tidak bisa scan  error
Windows defender di windows 8 tidak bisa scan error
 
Comodo SecureBox Management Console – Quick Start Guide
Comodo SecureBox Management Console – Quick Start GuideComodo SecureBox Management Console – Quick Start Guide
Comodo SecureBox Management Console – Quick Start Guide
 
How to install Microsoft Teams Android app
How to install Microsoft Teams Android appHow to install Microsoft Teams Android app
How to install Microsoft Teams Android app
 
Linked in security update
Linked in security updateLinked in security update
Linked in security update
 
Adding a User and Project to RD Apply
Adding a User and Project to RD ApplyAdding a User and Project to RD Apply
Adding a User and Project to RD Apply
 
Zoom basic Setup | Module
Zoom basic Setup | ModuleZoom basic Setup | Module
Zoom basic Setup | Module
 
Installation and authorization manual
Installation and authorization manualInstallation and authorization manual
Installation and authorization manual
 
15 things you should know about BA (En)
15 things you should know about BA  (En)15 things you should know about BA  (En)
15 things you should know about BA (En)
 
WorkShop Presentation
WorkShop PresentationWorkShop Presentation
WorkShop Presentation
 
Zoom Meeting Etiquettes and Best Practices
Zoom Meeting Etiquettes and Best PracticesZoom Meeting Etiquettes and Best Practices
Zoom Meeting Etiquettes and Best Practices
 

More from Dilip Sankarreddy

2022 Calendar by IIT Kharagpur
2022 Calendar by IIT Kharagpur2022 Calendar by IIT Kharagpur
2022 Calendar by IIT Kharagpur
Dilip Sankarreddy
 
Atmanirbhar presentation - Stimulus by Indian Government - Part 1 business in...
Atmanirbhar presentation - Stimulus by Indian Government - Part 1 business in...Atmanirbhar presentation - Stimulus by Indian Government - Part 1 business in...
Atmanirbhar presentation - Stimulus by Indian Government - Part 1 business in...
Dilip Sankarreddy
 
Guidelines on measures to be taken by Government of India for containment of ...
Guidelines on measures to be taken by Government of India for containment of ...Guidelines on measures to be taken by Government of India for containment of ...
Guidelines on measures to be taken by Government of India for containment of ...
Dilip Sankarreddy
 
A manual on homemade masks against corona virus covid 19
A manual on homemade masks against corona virus covid 19A manual on homemade masks against corona virus covid 19
A manual on homemade masks against corona virus covid 19
Dilip Sankarreddy
 
Lok Satta - comment on proposed Section 17A in Prevention of Corruption Act
Lok Satta - comment on proposed Section 17A in Prevention of Corruption ActLok Satta - comment on proposed Section 17A in Prevention of Corruption Act
Lok Satta - comment on proposed Section 17A in Prevention of Corruption Act
Dilip Sankarreddy
 
Schedule of Indian General Election 2014 and of State Assemblies
Schedule of Indian General Election 2014 and of State AssembliesSchedule of Indian General Election 2014 and of State Assemblies
Schedule of Indian General Election 2014 and of State Assemblies
Dilip Sankarreddy
 
LSP amendments to AP Reorganization Bill 2013 - Jan10, 2014
LSP amendments to AP Reorganization Bill 2013 - Jan10, 2014LSP amendments to AP Reorganization Bill 2013 - Jan10, 2014
LSP amendments to AP Reorganization Bill 2013 - Jan10, 2014
Dilip Sankarreddy
 
Lok Satta and FDR Recommendation on Prevention of Corruption (Amendment) Bill...
Lok Satta and FDR Recommendation on Prevention of Corruption (Amendment) Bill...Lok Satta and FDR Recommendation on Prevention of Corruption (Amendment) Bill...
Lok Satta and FDR Recommendation on Prevention of Corruption (Amendment) Bill...
Dilip Sankarreddy
 
Andhra Pradesh revenue sharing towards state reorganization
Andhra Pradesh revenue sharing towards state reorganizationAndhra Pradesh revenue sharing towards state reorganization
Andhra Pradesh revenue sharing towards state reorganization
Dilip Sankarreddy
 
Submission to President for reconsideration of bifurcation of state by Chief ...
Submission to President for reconsideration of bifurcation of state by Chief ...Submission to President for reconsideration of bifurcation of state by Chief ...
Submission to President for reconsideration of bifurcation of state by Chief ...
Dilip Sankarreddy
 
Article on Lok Satta Party's stand on Andhra Pradesh state bifurcation issue
Article on Lok Satta Party's stand on Andhra Pradesh state bifurcation issueArticle on Lok Satta Party's stand on Andhra Pradesh state bifurcation issue
Article on Lok Satta Party's stand on Andhra Pradesh state bifurcation issue
Dilip Sankarreddy
 
Dilip for Malkajgiri presentation
Dilip for Malkajgiri presentationDilip for Malkajgiri presentation
Dilip for Malkajgiri presentation
Dilip Sankarreddy
 

More from Dilip Sankarreddy (12)

2022 Calendar by IIT Kharagpur
2022 Calendar by IIT Kharagpur2022 Calendar by IIT Kharagpur
2022 Calendar by IIT Kharagpur
 
Atmanirbhar presentation - Stimulus by Indian Government - Part 1 business in...
Atmanirbhar presentation - Stimulus by Indian Government - Part 1 business in...Atmanirbhar presentation - Stimulus by Indian Government - Part 1 business in...
Atmanirbhar presentation - Stimulus by Indian Government - Part 1 business in...
 
Guidelines on measures to be taken by Government of India for containment of ...
Guidelines on measures to be taken by Government of India for containment of ...Guidelines on measures to be taken by Government of India for containment of ...
Guidelines on measures to be taken by Government of India for containment of ...
 
A manual on homemade masks against corona virus covid 19
A manual on homemade masks against corona virus covid 19A manual on homemade masks against corona virus covid 19
A manual on homemade masks against corona virus covid 19
 
Lok Satta - comment on proposed Section 17A in Prevention of Corruption Act
Lok Satta - comment on proposed Section 17A in Prevention of Corruption ActLok Satta - comment on proposed Section 17A in Prevention of Corruption Act
Lok Satta - comment on proposed Section 17A in Prevention of Corruption Act
 
Schedule of Indian General Election 2014 and of State Assemblies
Schedule of Indian General Election 2014 and of State AssembliesSchedule of Indian General Election 2014 and of State Assemblies
Schedule of Indian General Election 2014 and of State Assemblies
 
LSP amendments to AP Reorganization Bill 2013 - Jan10, 2014
LSP amendments to AP Reorganization Bill 2013 - Jan10, 2014LSP amendments to AP Reorganization Bill 2013 - Jan10, 2014
LSP amendments to AP Reorganization Bill 2013 - Jan10, 2014
 
Lok Satta and FDR Recommendation on Prevention of Corruption (Amendment) Bill...
Lok Satta and FDR Recommendation on Prevention of Corruption (Amendment) Bill...Lok Satta and FDR Recommendation on Prevention of Corruption (Amendment) Bill...
Lok Satta and FDR Recommendation on Prevention of Corruption (Amendment) Bill...
 
Andhra Pradesh revenue sharing towards state reorganization
Andhra Pradesh revenue sharing towards state reorganizationAndhra Pradesh revenue sharing towards state reorganization
Andhra Pradesh revenue sharing towards state reorganization
 
Submission to President for reconsideration of bifurcation of state by Chief ...
Submission to President for reconsideration of bifurcation of state by Chief ...Submission to President for reconsideration of bifurcation of state by Chief ...
Submission to President for reconsideration of bifurcation of state by Chief ...
 
Article on Lok Satta Party's stand on Andhra Pradesh state bifurcation issue
Article on Lok Satta Party's stand on Andhra Pradesh state bifurcation issueArticle on Lok Satta Party's stand on Andhra Pradesh state bifurcation issue
Article on Lok Satta Party's stand on Andhra Pradesh state bifurcation issue
 
Dilip for Malkajgiri presentation
Dilip for Malkajgiri presentationDilip for Malkajgiri presentation
Dilip for Malkajgiri presentation
 

Recently uploaded

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 

Recently uploaded (20)

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 

Advisory on Zoom video meeting platform by Ministry of Home Affairs (MHA) of India

  • 1. Page 1 of 16 dated April 12, 2020 Advisory on Secure use of Zoom meeting platform by private individuals (not for use by government offices/officials for official purpose) Zoom is a not a safe platform and advisory of cert-in on the same dated Feb 06, 2020 and March 30, 2020 may kindly be referred. These advisories are available on Cert-In website. 2. Those private individuals who still would like to use Zoom for private purpose may kindly follow the following guidelines. 3. Broad objective of this document is to enable/disable certain settings is to:  prevent unauthorised entry in the conference room  prevent an authorised participant to carry out malicious on the terminals of other in the conference.  Avoid DOS attack by restricting users through passwords and access grant. 4. Most of the settings can be done by login into users zoom account at website, or installed application at PC/Laptop/Phone and also during conduct of conference. However certain settings are possible through certain mode/channel only. For example, lock meeting can be enabled by administrator only when the meeting has started. This documents explains in details all the security configuration through website, App and through console during the conduct of conference
  • 2. Page 2 of 16 Objective of security configurations: 1. Setting new user ID and password for each meeting 2. Enabling waiting Room, so that every user can enter only when host conducting meeting admits him 3. Disabling join before host 4. Allowing Screen Sharing by host Only 5. Disabling “Allow removed participants to re-join” 6. Restricting/disabling file transfer option (if not required) 7. Locking meeting, once all attendees have joined 8. Restricting the recording feature 9. To end meeting (and not just leave, if you are administrator)
  • 3. Page 3 of 16 Section 1: Security Configuration Through website 1. Logging into zoom Website: https://zoom.us/ by entering your account credentials 2. After login, page looks like this. Three important and useful links are shown in red boxes, profile, setting and personal meeting ID 3. Click profile-> edit button in front of personal meeting ID shown in above diagram and un-check the box shown below and click save changes.
  • 4. Page 4 of 16 4. Click the setting on home page and keep on scrolling down the window and make necessary configuration as shown in figures below. Only important ones are marked in red boxes and others could be anything
  • 9. Page 9 of 16 Section 2: Security Configuration Through App 1. Zoom meeting App when launched look like this: 2. Update your App: First and fore most important thing is to update your Zoom App:  click menu -> navigate to check for update -> click
  • 10. Page 10 of 16 3. Set a password for personal meeting ID and enable waiting  click edit in meeting as shown below  Check password box, enter a strong password, check enable waiting window etc. desirable settings are shown in red boxes and click save
  • 11. Page 11 of 16 4. Avoid conducting meeting by using Personal Meeting ID (PMI). Clicking on start as shown below will start a meeting with personal meeting ID and password set by user as shown above. In this case PMI: 3452161630 and password: Sc@3Q* Problem in suing personal meeting ID is that with PMI and password is fixed. It does not automatically change with every new meeting. 5. Conduct a new meeting with randomly generated ID and password instead of fixed one as shown above  Click on home
  • 12. Page 12 of 16  Click New Meeting drop down as shown below  Un-check use My Personal Meeting ID (PMI), if not already done
  • 13. Page 13 of 16  Click new meeting icon to start a new meeting  Once Meeting has started, you will see your meeting ID and password by clicking left top icon below. it will be random and change with every new meeting.
  • 14. Page 14 of 16 6. Scheduling a meeting with randomly generated ID and password  Click schedule as shown below  The window as shown below will open up
  • 15. Page 15 of 16  After clicking advanced Options shown in above window following expansion will open and do setting as shown below. 6. Lock the meeting session, once all attendees have joined  Once meeting is in progress, control bar looks like this  Click Security and click on Lock Meeting, if all your participants have joined. you can enable waiting room from here also. you can also disable share screen by users from here
  • 16. Page 16 of 16 Miscellaneous tips:  Don't use your personal meeting Id (PMI) to host event, instead use randomly generated meeting IDs for each event.  Don't share your link on public platform, instead share randomly generated meeting id and password for every new meeting session/schedule. It makes it much secure and difficult to leak.  If you are admin, remember to end meeting, dont just leave meeting.  Sign out of your account when not in use Disclaimer: Information provided here is based on open source without warranty of any kind. ******* Cycord Support Team E-mail: cycordsupport.mha@gov.in Land Line: 011- 26531614, 011-26510245 whatsapp: +917292045198 Website: www.cycord.gov.in