

Require authentication so attendees must log in with their Zoom account before entering the meeting.Įnable the waiting room within your meeting settings to control who comes and goes and to give you a moment to do things like restrict participants' ability to share their screen or to use the chat before you admit attendees into the meeting. Full video tutorialĪdd registration to your meeting so attendees must provide an email address which is attached to a Zoom account. Learn about meeting IDs and how to generate a random meeting ID. Your PMI is essentially one continuous meeting, and people can pop in and out all the time. Here are some tips you can use to help when a public meeting space is necessary: Steps to take when scheduling the meetingĪvoid using your Personal Meeting ID (PMI) to host public events.

You may, however, occasionally require a meeting link (for office hours, for instance) that is open to a broader community of students than just one class. If you share your meeting link on social media or another public location, anyone with the link can join your meeting. Below are a few strategies that ensure your meetings are not disrupted. Depending on your personal settings, however, some ostensibly private meetings may also be vulnerable. Most attacks exploit publicly available Zoom links. These uninvited guests share their screens to bombard real attendees with disturbing or distracting content. Zoom-bombing is the term for when individuals "gate-crash" Zoom meetings.
