SlideShare a Scribd company logo
Page 1 of 16
dated April 12, 2020
Advisory-Zoom use for meetings, trainings etc.
Use of online meeting platforms like Zoom and Cisco
Webex etc have seen a tremendous jump in conducting
conferences, remote meetings and imparting education in the
wake of COVID-19 lockdown across the world. Most of the users
of these platforms are not aware of the correct way to configure
these platforms to ensure security.
2. Recently various vulnerabilities and weaknesses have been
reported in one of the most popular platform zoom. In present
scenario, it may not be possible for all the sectors to stop using
Zoom. Therefore, a comprehensive, graphical configuration
setting has been prepared by CyCord Center for secure use of
the platform.
3. Broad objective of enabling/disabling these settings is to
 prevent unauthorised entry in the conference room
 prevent an authorised participant to carry out malicious
activities on the terminals of others in the conference.
 Avoid DOS attack by restricting users through passwords
and access grant.
4. Most of the settings can be done by logging into users zoom
account at website, or installed application at PC/Laptop/Phone
and also during conduct of conference. However certain settings
are possible through certain mode/channel only. For example
lock meeting can be enabled by administrator only when the
meeting has started. This documents explains in details all the
security configuration through website, App and through console
during the conference.
Page 2 of 16
Objective of security configurations:
1. Setting new user ID and password for each meeting
2. Enabling waiting Room, so that every user can enter only
when host conducting meeting admits him
3. Disabling join before host
4. Allowing Screen Sharing by host Only
5. Disabling “Allow removed participants to re-join”
6. Restricting/disabling file transfer option (if not required)
7. Locking meeting, once all attendees have joined
8. Restricting the recording feature
9. To end meeting (and not just leave, if you are administrator)
Page 3 of 16
Section 1: Security Configuration Through website
1. Logging into zoom Website: https://zoom.us/ by entering your
account credentials
2. After login, page looks like this. Three important and useful links
are shown in red boxes, profile, setting and personal meeting ID
3. Click profile-> edit button in front of personal meeting ID shown
in above diagram and un-check the box shown below and click
save changes.
Page 4 of 16
4. Click the setting on home page and keep on scrolling down the
window and make necessary configuration as shown in figures
below. Only important ones are marked in red boxes and others
could be anything
Page 5 of 16
Page 6 of 16
Page 7 of 16
Page 8 of 16
Page 9 of 16
Section 2: Security Configuration Through App
1. Zoom meeting App when launched look like this:
2. Update your App: First and fore most important thing is to
update your Zoom App:
 click menu -> navigate to check for update -> click
Page 10 of 16
3. Set a password for personal meeting ID and enable waiting
 click edit in meeting as shown below
 Check password box, enter a strong password, check
enable waiting window etc. desirable settings are shown in
red boxes and click save
Page 11 of 16
4. Avoid conducting meeting by using Personal Meeting ID
(PMI).
Clicking on start as shown below will start a meeting with
personal meeting ID and password set by user as shown
above. In this case PMI: 3452161630 and password: Sc@3Q*
Problem in suing personal meeting ID is that with PMI and
password is fixed. It does not automatically change with every
new meeting.
5. Conduct a new meeting with randomly generated ID and
password instead of fixed one as shown above
 Click on home
Page 12 of 16
 Click New Meeting drop down as shown below
 Un-check use My Personal Meeting ID (PMI), if not already done
Page 13 of 16
 Click new meeting icon to start a new meeting
 Once Meeting has started, you will see your meeting ID and
password by clicking left top icon below. it will be random and
change with every new meeting.
Page 14 of 16
6. Scheduling a meeting with randomly generated ID and
password
 Click schedule as shown below
 The window as shown below will open up
Page 15 of 16
 After clicking advanced Options shown in above window
following expansion will open and do setting as shown below.
6. Lock the meeting session, once all attendees have joined
 Once meeting is in progress, control bar looks like this
 Click Security and click on Lock Meeting, if all your
participants have joined. you can enable waiting room from
here also. you can also disable share screen by users from
here
Page 16 of 16
Miscellaneous tips:
 Don't use your personal meeting Id (PMI) to host event,
instead use randomly generated meeting IDs for each
event.
 Don't share your link on public platform, instead share
randomly generated meeting id and password for every new
meeting session/schedule. It makes it much secure and
difficult to leak.
 If you are admin, remember to end meeting, dont just leave
meeting.
 Sign out of your account when not in use
*******
Cycord Support Team
E-mail: cycordsupport.mha@gov.in
Land Line: 011- 26531614, 011-26510245
whatsapp: +917292045198
Website: www.cycord.gov.in

More Related Content

What's hot

Zoom security and meeting participant management
Zoom security and meeting participant managementZoom security and meeting participant management
Zoom security and meeting participant management
Paul Richards
 
Remove chromium from computer
Remove chromium from computerRemove chromium from computer
Remove chromium from computer
haroNaroum
 
Get rid of ads by muzik fury in detailed steps
Get rid of ads by muzik fury in detailed stepsGet rid of ads by muzik fury in detailed steps
Get rid of ads by muzik fury in detailed steps
haroNaroum
 
Uninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.coUninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.co
haroNaroum
 
Step by step guide to remove viceice.com redirect from pc
Step by step guide to remove viceice.com redirect from pcStep by step guide to remove viceice.com redirect from pc
Step by step guide to remove viceice.com redirect from pc
haroNaroum
 
How to uninstall constant fun from computers
How to uninstall constant fun from computersHow to uninstall constant fun from computers
How to uninstall constant fun from computers
haroNaroum
 
Complete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pcComplete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pc
haroNaroum
 
Look trough your windows 10 privacy settings
Look trough your windows 10 privacy settingsLook trough your windows 10 privacy settings
Look trough your windows 10 privacy settings
Klaus Drosch
 
How To Use Skype
How To Use SkypeHow To Use Skype
How To Use Skype
Johnson & Wales University
 
Tips to uninstall Unisales
Tips to uninstall Unisales Tips to uninstall Unisales
Tips to uninstall Unisales
Adoniscooper
 
Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.com
kingh05
 
2015 MMLA IT Handbook
2015 MMLA IT Handbook2015 MMLA IT Handbook
2015 MMLA IT HandbookBelal Bahader
 
Ways to remove searchinme.com
Ways to remove searchinme.comWays to remove searchinme.com
Ways to remove searchinme.com
haroNaroum
 
Eikon3 getting startedguide_v1.1
Eikon3 getting startedguide_v1.1Eikon3 getting startedguide_v1.1
Eikon3 getting startedguide_v1.1Eldaw Ali Yousif
 
Step By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.comStep By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.com
andreswright576
 
Cyber Security Guide
Cyber Security GuideCyber Security Guide
Cyber Security Guide
Chris Roche
 
How to remove Trojan.Mirai
How to remove Trojan.MiraiHow to remove Trojan.Mirai
How to remove Trojan.Mirai
deniallorance65
 
Writing sample
Writing sampleWriting sample
Writing sampletcassa
 
How to get rid of ads by popdeals completely
How to get rid of ads by popdeals completelyHow to get rid of ads by popdeals completely
How to get rid of ads by popdeals completely
LinaWAND
 

What's hot (20)

Zoom security and meeting participant management
Zoom security and meeting participant managementZoom security and meeting participant management
Zoom security and meeting participant management
 
Remove chromium from computer
Remove chromium from computerRemove chromium from computer
Remove chromium from computer
 
Get rid of ads by muzik fury in detailed steps
Get rid of ads by muzik fury in detailed stepsGet rid of ads by muzik fury in detailed steps
Get rid of ads by muzik fury in detailed steps
 
Uninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.coUninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.co
 
Step by step guide to remove viceice.com redirect from pc
Step by step guide to remove viceice.com redirect from pcStep by step guide to remove viceice.com redirect from pc
Step by step guide to remove viceice.com redirect from pc
 
How to uninstall constant fun from computers
How to uninstall constant fun from computersHow to uninstall constant fun from computers
How to uninstall constant fun from computers
 
Complete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pcComplete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pc
 
WorkShop Presentation
WorkShop PresentationWorkShop Presentation
WorkShop Presentation
 
Look trough your windows 10 privacy settings
Look trough your windows 10 privacy settingsLook trough your windows 10 privacy settings
Look trough your windows 10 privacy settings
 
How To Use Skype
How To Use SkypeHow To Use Skype
How To Use Skype
 
Tips to uninstall Unisales
Tips to uninstall Unisales Tips to uninstall Unisales
Tips to uninstall Unisales
 
Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.com
 
2015 MMLA IT Handbook
2015 MMLA IT Handbook2015 MMLA IT Handbook
2015 MMLA IT Handbook
 
Ways to remove searchinme.com
Ways to remove searchinme.comWays to remove searchinme.com
Ways to remove searchinme.com
 
Eikon3 getting startedguide_v1.1
Eikon3 getting startedguide_v1.1Eikon3 getting startedguide_v1.1
Eikon3 getting startedguide_v1.1
 
Step By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.comStep By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.com
 
Cyber Security Guide
Cyber Security GuideCyber Security Guide
Cyber Security Guide
 
How to remove Trojan.Mirai
How to remove Trojan.MiraiHow to remove Trojan.Mirai
How to remove Trojan.Mirai
 
Writing sample
Writing sampleWriting sample
Writing sample
 
How to get rid of ads by popdeals completely
How to get rid of ads by popdeals completelyHow to get rid of ads by popdeals completely
How to get rid of ads by popdeals completely
 

Similar to Zoom meeting advisery.pdf

Support article1224
Support article1224Support article1224
Support article1224Breanna.org
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodo
William hendric
 
Comodo SecureBox Management Console – Quick Start Guide
Comodo SecureBox Management Console – Quick Start GuideComodo SecureBox Management Console – Quick Start Guide
Comodo SecureBox Management Console – Quick Start Guide
Riya Dey
 
Zoom Meeting Etiquettes and Best Practices
Zoom Meeting Etiquettes and Best PracticesZoom Meeting Etiquettes and Best Practices
Zoom Meeting Etiquettes and Best Practices
TariqulBari2
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPT
William hendric
 
Video Conferencing Software Tools 2020
Video Conferencing Software Tools 2020Video Conferencing Software Tools 2020
Video Conferencing Software Tools 2020
Edwin S. Garcia
 
Start Guide for data based optimization techniques
Start Guide for data based  optimization techniquesStart Guide for data based  optimization techniques
Start Guide for data based optimization techniques
ShatvikMishra1
 
Using voice to_input_data_in_microsoft_dynamics_crm
Using voice to_input_data_in_microsoft_dynamics_crmUsing voice to_input_data_in_microsoft_dynamics_crm
Using voice to_input_data_in_microsoft_dynamics_crm
aegisisccanada2
 
Seminar on zoom meeting technology
Seminar on zoom meeting technologySeminar on zoom meeting technology
Seminar on zoom meeting technology
Chala Geta
 
15 things you should know about BA (En)
15 things you should know about BA  (En)15 things you should know about BA  (En)
15 things you should know about BA (En)
BeAnywhere
 
How to Guide - Zoom
How to Guide - Zoom How to Guide - Zoom
How to Guide - Zoom
Manny423498
 
SugarMob Pro
SugarMob ProSugarMob Pro
SugarMob Pro
Biztech Store
 
Successful Meetings with Lync 2013 - Template for Training - Atidan
Successful Meetings with Lync 2013 - Template for Training - AtidanSuccessful Meetings with Lync 2013 - Template for Training - Atidan
Successful Meetings with Lync 2013 - Template for Training - AtidanDavid J Rosenthal
 
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PCStep by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Andualem192
 
Dynamics 365 self hosting bots
Dynamics 365 self hosting botsDynamics 365 self hosting bots
Dynamics 365 self hosting bots
Amit Patil
 
Installation and authorization manual
Installation and authorization manualInstallation and authorization manual
Installation and authorization manual
Guilherme W.:Rodolfo
 
Zoom basic Setup | Module
Zoom basic Setup | ModuleZoom basic Setup | Module
Zoom basic Setup | Module
Niva tharan
 
How to install_comodo_free_internet_security
How to install_comodo_free_internet_securityHow to install_comodo_free_internet_security
How to install_comodo_free_internet_security
William hendric
 
codeit_pre-training kit.pptx
codeit_pre-training kit.pptxcodeit_pre-training kit.pptx
codeit_pre-training kit.pptx
RuvelAlbino1
 

Similar to Zoom meeting advisery.pdf (20)

Support article1224
Support article1224Support article1224
Support article1224
 
Join.me basics
Join.me basicsJoin.me basics
Join.me basics
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodo
 
Comodo SecureBox Management Console – Quick Start Guide
Comodo SecureBox Management Console – Quick Start GuideComodo SecureBox Management Console – Quick Start Guide
Comodo SecureBox Management Console – Quick Start Guide
 
Zoom Meeting Etiquettes and Best Practices
Zoom Meeting Etiquettes and Best PracticesZoom Meeting Etiquettes and Best Practices
Zoom Meeting Etiquettes and Best Practices
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPT
 
Video Conferencing Software Tools 2020
Video Conferencing Software Tools 2020Video Conferencing Software Tools 2020
Video Conferencing Software Tools 2020
 
Start Guide for data based optimization techniques
Start Guide for data based  optimization techniquesStart Guide for data based  optimization techniques
Start Guide for data based optimization techniques
 
Using voice to_input_data_in_microsoft_dynamics_crm
Using voice to_input_data_in_microsoft_dynamics_crmUsing voice to_input_data_in_microsoft_dynamics_crm
Using voice to_input_data_in_microsoft_dynamics_crm
 
Seminar on zoom meeting technology
Seminar on zoom meeting technologySeminar on zoom meeting technology
Seminar on zoom meeting technology
 
15 things you should know about BA (En)
15 things you should know about BA  (En)15 things you should know about BA  (En)
15 things you should know about BA (En)
 
How to Guide - Zoom
How to Guide - Zoom How to Guide - Zoom
How to Guide - Zoom
 
SugarMob Pro
SugarMob ProSugarMob Pro
SugarMob Pro
 
Successful Meetings with Lync 2013 - Template for Training - Atidan
Successful Meetings with Lync 2013 - Template for Training - AtidanSuccessful Meetings with Lync 2013 - Template for Training - Atidan
Successful Meetings with Lync 2013 - Template for Training - Atidan
 
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PCStep by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
 
Dynamics 365 self hosting bots
Dynamics 365 self hosting botsDynamics 365 self hosting bots
Dynamics 365 self hosting bots
 
Installation and authorization manual
Installation and authorization manualInstallation and authorization manual
Installation and authorization manual
 
Zoom basic Setup | Module
Zoom basic Setup | ModuleZoom basic Setup | Module
Zoom basic Setup | Module
 
How to install_comodo_free_internet_security
How to install_comodo_free_internet_securityHow to install_comodo_free_internet_security
How to install_comodo_free_internet_security
 
codeit_pre-training kit.pptx
codeit_pre-training kit.pptxcodeit_pre-training kit.pptx
codeit_pre-training kit.pptx
 

Recently uploaded

Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
Allensmith572606
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 

Recently uploaded (20)

Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 

Zoom meeting advisery.pdf

  • 1. Page 1 of 16 dated April 12, 2020 Advisory-Zoom use for meetings, trainings etc. Use of online meeting platforms like Zoom and Cisco Webex etc have seen a tremendous jump in conducting conferences, remote meetings and imparting education in the wake of COVID-19 lockdown across the world. Most of the users of these platforms are not aware of the correct way to configure these platforms to ensure security. 2. Recently various vulnerabilities and weaknesses have been reported in one of the most popular platform zoom. In present scenario, it may not be possible for all the sectors to stop using Zoom. Therefore, a comprehensive, graphical configuration setting has been prepared by CyCord Center for secure use of the platform. 3. Broad objective of enabling/disabling these settings is to  prevent unauthorised entry in the conference room  prevent an authorised participant to carry out malicious activities on the terminals of others in the conference.  Avoid DOS attack by restricting users through passwords and access grant. 4. Most of the settings can be done by logging into users zoom account at website, or installed application at PC/Laptop/Phone and also during conduct of conference. However certain settings are possible through certain mode/channel only. For example lock meeting can be enabled by administrator only when the meeting has started. This documents explains in details all the security configuration through website, App and through console during the conference.
  • 2. Page 2 of 16 Objective of security configurations: 1. Setting new user ID and password for each meeting 2. Enabling waiting Room, so that every user can enter only when host conducting meeting admits him 3. Disabling join before host 4. Allowing Screen Sharing by host Only 5. Disabling “Allow removed participants to re-join” 6. Restricting/disabling file transfer option (if not required) 7. Locking meeting, once all attendees have joined 8. Restricting the recording feature 9. To end meeting (and not just leave, if you are administrator)
  • 3. Page 3 of 16 Section 1: Security Configuration Through website 1. Logging into zoom Website: https://zoom.us/ by entering your account credentials 2. After login, page looks like this. Three important and useful links are shown in red boxes, profile, setting and personal meeting ID 3. Click profile-> edit button in front of personal meeting ID shown in above diagram and un-check the box shown below and click save changes.
  • 4. Page 4 of 16 4. Click the setting on home page and keep on scrolling down the window and make necessary configuration as shown in figures below. Only important ones are marked in red boxes and others could be anything
  • 9. Page 9 of 16 Section 2: Security Configuration Through App 1. Zoom meeting App when launched look like this: 2. Update your App: First and fore most important thing is to update your Zoom App:  click menu -> navigate to check for update -> click
  • 10. Page 10 of 16 3. Set a password for personal meeting ID and enable waiting  click edit in meeting as shown below  Check password box, enter a strong password, check enable waiting window etc. desirable settings are shown in red boxes and click save
  • 11. Page 11 of 16 4. Avoid conducting meeting by using Personal Meeting ID (PMI). Clicking on start as shown below will start a meeting with personal meeting ID and password set by user as shown above. In this case PMI: 3452161630 and password: Sc@3Q* Problem in suing personal meeting ID is that with PMI and password is fixed. It does not automatically change with every new meeting. 5. Conduct a new meeting with randomly generated ID and password instead of fixed one as shown above  Click on home
  • 12. Page 12 of 16  Click New Meeting drop down as shown below  Un-check use My Personal Meeting ID (PMI), if not already done
  • 13. Page 13 of 16  Click new meeting icon to start a new meeting  Once Meeting has started, you will see your meeting ID and password by clicking left top icon below. it will be random and change with every new meeting.
  • 14. Page 14 of 16 6. Scheduling a meeting with randomly generated ID and password  Click schedule as shown below  The window as shown below will open up
  • 15. Page 15 of 16  After clicking advanced Options shown in above window following expansion will open and do setting as shown below. 6. Lock the meeting session, once all attendees have joined  Once meeting is in progress, control bar looks like this  Click Security and click on Lock Meeting, if all your participants have joined. you can enable waiting room from here also. you can also disable share screen by users from here
  • 16. Page 16 of 16 Miscellaneous tips:  Don't use your personal meeting Id (PMI) to host event, instead use randomly generated meeting IDs for each event.  Don't share your link on public platform, instead share randomly generated meeting id and password for every new meeting session/schedule. It makes it much secure and difficult to leak.  If you are admin, remember to end meeting, dont just leave meeting.  Sign out of your account when not in use ******* Cycord Support Team E-mail: cycordsupport.mha@gov.in Land Line: 011- 26531614, 011-26510245 whatsapp: +917292045198 Website: www.cycord.gov.in