Zoombombing Resources

In response to the spread of COVID-19, the University of Miami (UM) has transitioned to online classes for the remainder of the spring 2020 semester. As a result, our community is currently working, teaching, and learning via video conferencing platforms, including Zoom.

What is Zoombombing?

Zoombombing is a new form of trolling in which a participant uses Zoom's screensharing feature to interrupt and disrupt meetings and classes.

How to Avoid Zoombombing

At this time, we advise faculty to link to Zoom lectures from within Blackboard, and for all UM community members to set a password to join meetings and/or to enable the waiting room option.

Open All Tabs
  • Set a Meeting Password

    Setting a strong password for your meeting can prevent unanticipated guests from joining. When scheduling a meeting, under Meeting Options, select Require meeting password, then specify a strong password (make your password at least eight characters long and use at least three of the following types of characters: lowercase letters, uppercase letters, numbers, symbols). Participants will be asked to enter this password in order to join your meeting.

  • Enable Waiting Room

    The Waiting Room feature allows the host to control when participants join your meeting. As the meeting host, you can admit attendees individually, or hold all attendees in the virtual waiting room and admit all when you are ready to begin. Admitting participants from the Waiting Room requires an additional step for the host, but provides increased control to only allow participants to join the meeting when you admit them. This feature can be enabled on a per-meeting basis when scheduling.

  • Disable Join Before Host

    If you are scheduling a meeting where sensitive information will be discussed and you do not want participants to start the meeting without you, it's best to disable join before host functionality. If you disable this functionality, participants will see a pop-up dialog that says, "Please wait for the host to start this meeting." If you are the host, there is a login button to login and start the meeting as the host. This feature can also be enabled or disabled on a per-meeting basis when scheduling.

  • Limit Sharing to the Host

    This restriction can help prevent intrusive sharing and potential meeting disruptions. However, this may not be appropriate when multiple participants need to share and collaborate. To limit sharing privileges while in your meeting:

    • Click the up-arrow next to Share Screen.
    • Select Advanced Sharing Options.
    • Under Who can share, click Only Host.

  • Remove a Participant

    If you are the host or co-host in a session and notice an unwanted guest has joined or a participant is disruptive to your session, you have the option to remove them. To remove a participant:

    • Click Manage Participants at the bottom of the Zoom window (if the Participants panel is not already visible).
    • Next to the person you want to remove, click More.
    • From the list that appears, click Remove.

  • Lock Your Meeting

    The Zoom Host Controls allow the host or co-host to lock the meeting once all anticipated participants have joined the meeting. When a meeting is locked, no one else can join the session, regardless of having a meeting password. To lock your meeting:

    • Click Manage Participants at the bottom of the Zoom window (if the Participants panel is not already visible).
    • At the bottom of the Participants panel, click More.
    • From the list that appears, click Lock Meeting.

  • Restrict a Meeting to UM Users Only

    By default, anyone with the join link or meeting ID can join a meeting hosted by users on your account, even if they are not signed into Zoom. To prevent unknown participants from joining the session, you have the option to restrict meeting participants to users who are signed into Zoom, or only to University of Miami (UM) authenticated users.

    To only allow UM users to join a Zoom meeting, you can (a) enable this setting per meeting you are scheduling, or (b) enable it as a default setting for all meetings you create. Step by step details are listed below:

    Schedule a Zoom Meeting for Only UM Users:
    1. Open the Zoom desktop client, and select Schedule.
    2. Enter all of your Zoom meeting details. Then, at the bottom of the new meeting scheduler, select Advanced Options.
    3. Within the options menu, select Only authenticated users can join. From the drop-down menu, select All UM Users.
    4. To confirm and schedule your meeting, select Schedule.
    Set to Allow Only UM Users as Default:
    1. Access your online Zoom account by visiting zoom.miami.edu and logging in with your University of Miami CaneID and password. Once logged in, click Settings.
    2. Within the Schedule Meeting settings sub-panel, enable Only authenticated users can join meetings.
    3. Next to All UM Users, select Edit. Within the editor, you can add additional .miami.edu domains (such as *.med.miami.edu or *.rsmas.miami.edu).
    4. Select Set as default authentication option by clicking the blue check mark box. Then, click Save to confirm.

  • Ensure You are Using the Latest Version of the Zoom Client

    Download the latest version the Zoom client by visiting: zoom.us/download. This will ensure all of the latest privacy and security features are available. Click here to learn more about downloading the latest version of Zoom.

Additional Zoom Security Resources

Quick Dropdown Links:
5 Things to Know About Zoom 5.0
90-Day Security Plan Progress Report
Zoom Product Updates: Restricted Screen Sharing by Default, Consent for Unmuting and Audio Alert for the Waiting Room
Zoom Acquires Keybase and Announces Goal of Developing Encryption Enhancements
Enhanced Password Capabilities for Zoom Meetings, Webinars, and Cloud Recordings
New Security Toolbar Icon for Hosts, Meeting ID No Longer Displayed
How to Keep Uninvited Guests Out of Your Zoom Event
Zoom's Advanced Sharing Settings for Education
Best Practices for Securing Your Virtual Classrooms

5 Things to Know About Zoom 5.0

We're excited to share that Zoom 5.0 is now generally available! This release delivers one of our most advanced security enhancements to date with support for AES 256-bit GCM encryption, which provides added protection for meeting data and greater resistance to tampering.

So, what does this new encryption algorithm mean for you, and what other security functionality should users be aware of in this new release? Here are 5 things you should know about Zoom 5.0:

1. AES 256-bit GCM Encryption

Zoom 5.0 supports our current encryption and GCM encryption. A system-wide account enablement to GCM encryption will occur on May 30, 2020, and only Zoom clients on version 5.0 or later, including Zoom Rooms, will be able to join Zoom Meetings starting May 30.

2. Report a User Feature

Meeting hosts and co-hosts can report a user in their meeting who is misusing the Zoom platform. Found in the Security icon, the option sends a report to Zoom's Trust & Safety team for review. The report can include a specific offense, description, and optional screenshot. The Report a User function is on by default but can be turned off at the account, group, and user level in the Zoom web portal.

3. New Encryption Icon

A new encryption shield appears in the upper left of your Zoom Meeting window and indicates a secure, encrypted meeting. After May 30, the shield will be green for all users, denoting enhanced GCM encryption. Clicking the icon also takes you to the Statistics page for additional encryption details.

4. Enhanced Data Center Information

Meeting hosts can now select data center regions at the scheduling level for meetings and webinars. The Zoom client also shows which data center you're connected to in the Info icon in the upper left of your Zoom window. You can get additional details in-meeting by selecting Video Settings - Statistics in the meeting controls.

5. Enhancements to Ending/Leaving Meetings

We've refined the action of ending or leaving a Zoom Meeting to make it easier and also more secure. With a new UI update, hosts can clearly decide between ending or leaving a meeting. If the host leaves, they can now easily select a new host and have the confidence that the right person is left with host privileges.

Additional Security Enhancements

A few other recent Zoom security updates include:

  • Profile picture control: Account admins and hosts can disable the ability for participants to show their profile picture and also prevent them from changing it in a meeting.
  • Minimum password length: The minimum default password length will be six characters for meetings, webinars, and cloud recordings.
  • Cloud recording security: Admins and meeting hosts can set expirations on their cloud recordings and can disable the sharing of their recordings.
Updating to Zoom 5.0

Upgrade to Zoom 5.0 by visiting the Zoom download page.

For additional information, check out the Zoom 5.0 webpage or the Release Notes.

90-Day Security Plan Progress Report

As Zoom continues on their 90-day plan to improve the security and privacy of our platform, this week's "Ask Eric Anything" webinar focused on meeting safety, Zoom Phone's FedRAMP authorization, and Zoom's bug bounty program.

Zoom CEO Eric S. Yuan was joined by Zoom CPO Oded Gal; Lynn Haaland, Zoom Deputy General Counsel, Chief Compliance and Ethics Officer; and Katie Moussouris, founder and CEO of Luta Security. Zoom CTO Brendan Ittelson and Lea Kissner, former Global Lead of Privacy Technology at Google who is consulting with Zoom on privacy and encryption, joined for the Q&A session.

Updates from the past week and upcoming plans over the next few weeks:

Key Takeaways from this Week's Session

Zoom Phone FedRAMP Authorization Approved

We announced today that Zoom Phone authorization under U.S. FedRAMP has been approved. This authorization allows U.S. federal government agencies and contractors to now use Zoom Phone as part of our existing, broader authorized Zoom for Government offering. Zoom for Government provides U.S. government agencies a full Zoom UCaaS platform, including Zoom Meetings and Chat, Zoom Video Webinars, conference room solutions, and now, Zoom Phone.

Meeting Safety

Lynn Haaland talked about what Zoom has done over the past couple of months to help prevent meeting disruptions from bad actors. This includes adding default security settings like passwords and waiting rooms for certain users, surfacing in-meeting security controls in the Security icon, adding reporting mechanisms, working closely with law enforcement and other online platforms, and educating users on security best practices.

Lynn also reiterated these tips for securing your Zoom meetings:

  • Do not publicly share your meeting ID and/or passwords.
  • Keep Zoom default security features on - these include waiting rooms, passwords, and restricted screen sharing.
  • Get to know our host privacy and security features like Disable Video, Mute Participants, Remove Participants, and Lock Meeting.
  • Use meeting registration.

Lynn explained that Zoom Meetings is not designed for large-scale or public events where you post the invite on the internet. Instead, we highly recommend you use Zoom Video Webinars, which gives you more control over the audience and experience. Get more details on meetings vs. webinars on our support page.

Zoom's Bug Bounty Program

Katie Moussouris, the founder and CEO of Luta Security and a security consultant for Zoom talked about how Zoom’s bug bounty program will work, explaining that it uses a crowd-sourced model that relies on all parties, including security researchers, to find and report bugs. She also noted that before Zoom implements changes to its bug bounty program, we are soliciting feedback from the wider community to optimize these programs.

Zoom 5.0 Reminder

Zoom 5.0 became generally available on April 27. A system-wide account enablement to AES 256-bit GCM encryption will occur on May 30, 2020. We urge all users to update to 5.0 today, if you have not done so already.

End-to-End Encryption Design Paper Coming Friday

We will publish a detailed draft cryptographic design for our end-to-end encryption offering this Friday on GitHub. We will be hosting discussions with cryptographic experts, customers, advocacy groups, and others to solicit feedback to evaluate for the final design.


Here are some of the webinar attendee questions that were addressed live this week:

How do you report a security bug?

Visit zoom.us/security or send an email to security@zoom.us.

If I'm using a Chromebook, how do I download the Zoom 5.0 client?

Chromebook users can download the Zoom Chromebook application from the Google app store or use the Zoom web client, which will always be up to date.

Are account admins notified when a user is reported to Zoom?

When a host or co-host utilizes the Report a User feature to report a meeting participant, a report is sent to Zoom's Trust & Safety Team. However, in the future we plan to notify account admins for certain accounts when one of their users is reported in certain situations.

Can anyone other than the host record a meeting?

The host can grant access to another participant to record, but no one can start a Zoom recording without a host's consent.

Can you give details on the May 22 draft design on end-to-end encryption?

The draft to be released May 22 shares our plan and design for building an end-to-end-encrypted video service. This draft won't include any actual code. We want to gather and evaluate feedback before developing our end-to-end encryption offering.

Are there any plans to allow private chat with a user in the Waiting Room to help verify their identity?

Oded said that this is one of our most requested enhancements, and it is on our roadmap.

Why has Unmute All been removed, and are there plans to bring it back?

We removed the Unmute All feature from the user interface because hosts could unmute participants without their consent. We will reinstate this feature in the future. However, hosts will need a participant's consent to unmute them during a meeting.

Watch the Latest "Ask Eric Anything" Recording

If you missed the latest session, you can watch the recording here:

To give your feedback or to ask Zoom a question, send an email to answers@zoom.us. And be sure to sign up for next week's "Ask Eric Anything" webinar.

Zoom Product Updates: Restricted Screen Sharing by Default, Consent for Unmuting and Audio Alert for the Waiting Room

We announced several recent security updates and user interface enhancements from the product team during the May 20 "Ask Eric Anything" webinar. Here's a roundup of the main security changes to the Zoom platform from the past week:

  • Screen sharing: For single Zoom Pro accounts, screen sharing is set to Host Only by default. Hosts and co-hosts can grant access to other participants in the Security icon.
  • Consent for unmute: When a meeting host has muted a participant, they can no longer unmute that person without their consent. That participant will now receive a prompt asking for consent to be unmuted. (Note: With this feature, the option for hosts to Unmute All participants at once has been removed, but will return in a later release.)
  • New audio for Waiting Rooms: We've created a specific audio chime for when someone hits the Waiting Room, so hosts are aware that they're there. You can also enable the "Play sound when participants join or leave" feature to hear alerts when participants are coming and going.
  • Temporarily removing GIPHY: To ensure strong privacy protection for users, we've temporarily removed the GIPHY integration in Zoom Chat. Once additional technical and security measures have been deployed, we will re-enable the feature.
  • Meeting information during screen share: Participants can now access meeting information, such as meeting ID, when sharing their screen. Find it under "More" in the meeting controls.
  • Multiple login restrictions: For meetings that require registration, hosts can choose whether to allow participants to join from multiple devices. This is available under Registration Options of the meeting details section in the Zoom web portal (zoom.miami.edu).

For additional info on all recent Zoom platform updates, check out our Release Notes.

To learn more about securing your Zoom meetings, check out our Privacy and Security webpage for additional information and resources.

Zoom Acquires Keybase and Announces Goal of Developing Encryption Enhancements

We are proud to announce the acquisition of Keybase, another milestone in Zoom's 90-day plan to further strengthen the security of our video communications platform. Since its launch in 2014, Keybase's team of exceptional engineers has built a secure messaging and file-sharing service leveraging their deep encryption and security expertise. We are excited to integrate Keybase's team into the Zoom family to help us build end-to-end encryption that can reach current Zoom scalability.

This acquisition marks a key step for Zoom as we attempt to accomplish the creation of a truly private video communications platform that can scale to hundreds of millions of participants, while also having the flexibility to support Zoom's wide variety of uses. Our goal is to provide the most privacy possible for every use case, while also balancing the needs of our users and our commitment to preventing harmful behavior on our platform. Keybase's experienced team will be a critical part of this mission.

Zoom Encryption Today

Today, audio and video content flowing between Zoom clients (e.g., Zoom Rooms, laptop computers, and smartphones running the Zoom app) is encrypted at each sending client device. It is not decrypted until it reaches the recipients' devices. With the recent Zoom 5.0 release, Zoom clients now support encrypting content using industry-standard AES-GCM with 256-bit keys. However, the encryption keys for each meeting are generated by Zoom's servers. Additionally, some features that are widely used by Zoom clients, such as support for attendees to call into a phone bridge or use in-room meeting systems offered by other companies, will always require Zoom to keep some encryption keys in the cloud. However, for hosts who seek to prioritize privacy over compatibility, we will create a new solution.

The Near Future

Zoom will offer an end-to-end encrypted meeting mode to all paid accounts. Logged-in users will generate public cryptographic identities that are stored in a repository on Zoom's network and can be used to establish trust relationships between meeting attendees. An ephemeral per-meeting symmetric key will be generated by the meeting host. This key will be distributed between clients, enveloped with the asymmetric keypairs and rotated when there are significant changes to the list of attendees. The cryptographic secrets will be under the control of the host, and the host's client software will decide what devices are allowed to receive meeting keys, and thereby join the meeting. We are also investigating mechanisms that would allow enterprise users to provide additional levels of authentication.

These end-to-end encrypted meetings will not support phone bridges, cloud recording, or non-Zoom conference room systems. Zoom Rooms and Zoom Phone participants will be able to attend if explicitly allowed by the host. Encryption keys will be tightly controlled by the host, who will admit attendees.We believe this will provide equivalent or better security than existing consumer end-to-end encrypted messaging platforms, but with the video quality and scale that has made Zoom the choice of over 300 million daily meeting participants, including those at some of the world's largest enterprises.

As we do this work to further protect our users' privacy, we are also cognizant of our desire to prevent the use of Zoom's products to cause harm. To that end, we will be taking the following steps:

  • We will continue to work with users to enhance the reporting mechanisms available to meeting hosts to report unwanted and disruptive attendees.
  • Zoom does not and will not proactively monitor meeting contents, but our trust and safety team will continue to use automated tools to look for evidence of abusive users based upon other available data.
  • Zoom has not and will not build a mechanism to decrypt live meetings for lawful intercept purposes.
  • We also do not have a means to insert our employees or others into meetings without being reflected in the participant list. We will not build any cryptographic backdoors to allow for the secret monitoring of meetings.

Next Steps

We are committed to remaining transparent and open as we build our end-to-end encryption offering. We plan to publish a detailed draft cryptographic design on Friday, May 22. We will then host discussion sections with civil society, cryptographic experts, and customers to share more details and solicit feedback. Once we have assessed this feedback for integration into a final design, we will announce our engineering milestones and goals for deploying to Zoom users.

We look forward to welcoming the Keybase team and are excited for the possibilities of what we can build together.

Enhanced Password Capabilities for Zoom Meetings, Webinars, and Cloud Recordings

The Zoom team has been hard at work delivering additional features that further secure your Zoom meeting and webinar experiences. This past weekend's release included additional password protections, one of the best options for securing your meetings and webinars.

Here's a quick overview of the new password options, Zoom's random meeting ID generator, and other Zoom platform developments.

What's New

Password requirements: For meetings and webinars, account owners and admins can now configure minimum meeting password requirements to adjust the minimum length and require letters, numbers, and special characters, or allow only numeric passwords.

Random meeting IDs: One-time randomly generated meetings IDs for newly scheduled meetings and webinars will be 11 digits instead of nine. Your Personal Meeting ID (PMI) will remain the same.

Cloud recordings: Password protection for shared cloud recordings is now on by default for all accounts. We've also enhanced the complexity of passwords on your cloud recordings. Existing shared recordings are not affected.

  • As the host, you can adjust the following options in your Zoom recording settings to manage password protection:
    • Customize the recording password to a preferred password.  To do so, log in via zoom.miami.edu and click Recordings. Next to the specific recording, click Share > scroll to Password protection > insert your custom password > click Save. Click here for step-by-step screengrabs.
    • Turn off password protection for specific recordings, as needed. To do so, log in via zoom.miami.edu and click Recordings. Next to the specific recording, click Share > scroll to Password protection and disable the option. Click here for step-by-step screengrabs.
    • Turn the recording password feature off on your Zoom account. To do so, log in via miami.edu and click Settings > Recording > scroll down to Require password to access shared cloud recordings and disable the option. Click here for step-by-step screengrabs.

Third-party file sharing: You can once again use third-party platforms, such as Box, Dropbox, and OneDrive, to share across the Zoom platform. We temporarily disabled this feature and have restored it after a full security review of the process.

Zoom Chat message preview: Zoom Chat users can hide the message preview for desktop chat notifications. If this is turned off, you'll simply be alerted that you have a new message without displaying any message content.

Additionally, we've fixed issues related to missing data and delay on the Zoom Dashboard. We will continue to monitor and make improvements to dashboard and reporting performance.

For more information on these changes, please check out the Release Notes for 4.6.11.

New Security Toolbar Icon for Hosts, Meeting ID No Longer Displayed

On April 8, 2020, Zoom implemented an important update to help make your meetings more private and secure. The most visible change that meeting hosts will see is an option in the Zoom meeting controls called Security. This new icon simplifies how hosts can quickly find and enable many of Zoom's in-meeting security features.

Visible only to hosts and co-hosts of Zoom Meetings, the Security icon provides easy access to several existing Zoom security features so you can more easily protect your meetings.

By clicking the Security icon, hosts and co-hosts have an all-in-one place to quickly:

Zoom recognizes that various security settings in the Zoom client, while extremely useful, were also extremely scattered. The addition of this persistent Security icon helps augment some of the default Zoom security features in your profile settings and enables Zoom users to more quickly take action to prevent meeting disruption.

The Security icon replaces the Invite button in the meeting controls. The Invite button has been moved to the Participants panel, and hosts can add additional guests there.

The Security icon is available in Zoom's latest release (version 4.6.10) to all Zoom hosts and co-hosts in all free and paid account types on desktop (Mac & Windows), mobile (iOS & Android), iPad, and in the web client.

Meeting ID No Longer Displayed:

Additionally, the Zoom Meeting ID will no longer be displayed on the title toolbar. The title will simply be "Zoom" for all meetings, preventing others from seeing active meeting IDs when, for instance, Zoom screenshots are posted publicly.

Additional Resources:

How to Keep Uninvited Guests Out of Your Zoom Event

As more people use our platform and host their virtual events using Zoom, we wanted to offer up tips to ensure everyone joining an event does so with good intentions. Like most other public forums, it's possible to have a person (who may or may not be invited) disrupt an event that’s meant to bring people together.

So, a couple of reminders on using Zoom to host public events:

  • When you share your meeting link on social media or other public forums, that makes your event extremely public. ANYONE with the link can join your meeting.
  • Avoid using your Personal Meeting ID (PMI) to host public events. Your PMI is basically one continuous meeting and you don’t want randos crashing your personal virtual space after the party's over. Learn about meeting IDs and how to generate a random meeting ID (at the 0:27 mark) in this video tutorial.
  • Familiarize yourself with Zoom's settings and features so you understand how to protect your virtual space when you need to. For example, the Waiting Room is an unbelievably helpful feature for hosts to control who comes and goes. (More on that below.)

Read on for a list of Zoom features that can help you safely share your Zoom virtual cocktail hour or dance break without unwanted interruptions. Ok, Zoomer? Let's do it!

Manage Screen Sharing

The first rule of Zoom Club: Don't give up control of your screen. 

You do not want random people in your public event taking control of the screen and sharing unwanted content with the group. You can restrict this—before the meeting and during the meeting in the host control bar—so that you're the only one who can screen-share.

To prevent participants from screen sharing during a call, using the host controls at the bottom, click the arrow next to Share Screen and then Advanced Sharing Options.

Advanced Sharing Options

Under "Who can share?" choose "Only Host" and close the window. You can also lock the Screen Share by default for all your meetings in your web settings.

Prevent others from screen sharing

Manage Your Participants

Some of the other great features to help secure your Zoom event and host with confidence:

Authorized Attendees

This is useful if you want to control your guest list and invite only those you want at your event — other students at your school or colleagues, for example.

  • Lock the meeting: It's always smart to lock your front door, even when you're inside the house. When you lock a Zoom Meeting that's already started, no new participants can join, even if they have the meeting ID and password (if you have required one). In the meeting, click Participants at the bottom of your Zoom window. In the Participants pop-up, click the button that says Lock Meeting.
  • Set up your own two-factor authentication: You don't have to share the actual meeting link! Generate a random Meeting ID when scheduling your event and require a password to join. Then you can share that Meeting ID on Twitter but only send the password to join via DM.
  • Remove unwanted or disruptive participants: From that Participants menu, you can mouse over a participant's name, and several options will appear, including Remove. Click that to kick someone out of the meeting.
  • Allow removed participants to rejoin: When you do remove someone, they can't rejoin the meeting. But you can toggle your settings to allow removed participants to rejoin, in case you boot the wrong person.
  • Put 'em on hold: You can put everyone else on hold, and the attendees' video and audio connections will be disabled momentarily. Click on someone's video thumbnail and select Start Attendee On Hold to activate this feature. Click Take Off Hold in the Participants list when you're ready to have them back.
  • Disable video: Hosts can turn someone's video off. This will allow hosts to block unwanted, distracting, or inappropriate gestures on video or for that time your friend’s inside pocket is the star of the show.
  • Mute participants: Hosts can mute/unmute individual participants or all of them at once. Hosts can block unwanted, distracting, or inappropriate noise from other participants. You can also enable Mute Upon Entry in your settings to keep the clamor at bay in large meetings.
  • Turn off file transfer: In-meeting file transfer allows people to share files through the in-meeting chat. Toggle this off to keep the chat from getting bombarded with unsolicited pics, GIFs, memes, and other content.
  • Turn off annotation: You and your attendees can doodle and mark up content together using annotations during screen share. You can disable the annotation feature in your Zoom settings to prevent people from writing all over the screens.
  • Disable private chat: Zoom has in-meeting chat for everyone or participants can message each other privately. Restrict participants' ability to chat amongst one another while your event is going on and cut back on distractions. This is really to prevent anyone from getting unwanted messages during the meeting.
Try the Waiting Room 

One of the best ways to use Zoom for public events is to enable the Waiting Room feature. Just like it sounds, the Waiting Room is a virtual staging area that stops your guests from joining until you're ready for them. It's almost like the velvet rope outside a nightclub, with you as the bouncer carefully monitoring who gets let in.

Meeting hosts can customize Waiting Room settings for additional control, and you can even personalize the message people see when they hit the Waiting Room so they know they're in the right spot. This message is really a great spot to post any rules/guidelines for your event, like who it's intended for.

Waiting Room message

The Waiting Room is really a great way to screen who's trying to enter your event and keep unwanted guests out.

Zoom's Advanced Sharing Settings for Education

Based on feedback from the education community, Zoom recently released a product enhancement to give teachers more control over their meetings.

Host Sharing Enhancements

As of March 26, 2020, the screen sharing settings within your account have automatically defaulted to "Only Host." This setting gives hosts sole permission to share content within their meetings by default.

How do I give meeting participants the ability to share?

If you'd like to give participants screen sharing permission when hosting your next meeting, simply click the arrow to the right of the Screen Sharing icon, select Advanced Sharing Options and select All Participants.

If you'd like to re-enable participant content sharing at the account level, please visit miami.zoom.us/profile/setting > In Meetings (Basic) > Screen sharing > and select All Participants. For reference, see the screengrab below:


Visit the Zoom Help Center for more information regarding this update.

Sharing of Zoom Recordings

Please note that Zoom recently turned on a setting to require a password for recordings that are sent out.

Best Practices for Securing Your Virtual Classrooms

Zoom has helped thousands of schools and teachers around the world quickly shift to remote virtual learning. Click here to read the Zoom blog which highlights best practices for securing your virtual classrooms. Also, check out this video on securing your virtual classroom from the Zoom team:

For more information about Zoom, including a list of features and benefits, visit the Zoom service page. For answers to commonly asked questions, review the Zoom FAQs.

If you suspect you may be a victim of Zoombombing, please contact the UMIT Service Desk at: (305) 284-6565 or help@miami.edu, as well as the IT Security team at: ciso@miami.edu.


Back to Top