Ir para conteúdo

 

ZOOM – Versão: 4.6.10 (20033.0407)*


Access to the platform

The preparation of videoconferences can be done through the online ZOOM platform (Figure 1) or through the client application installed on the device (Figure 2).

In either situation, when authenticating the user, it is recommended to inactivate the "Keep me signed in" option.


Figure 1
Figure 2

Basic configuration

Before scheduling meetings there are some configuration aspects that the user should consider. These settings will remain by default in subsequent meetings. Some of these settings are only available through the online platform. In the client application, the user can be redirected via the "View More Settings" option on the settings screen (Figures 3 and 4)

Figure 3
Figure 4
In the settings menu, through the online platform, the following options are highlighted:
  • Requires a password for the personal meeting ID (PMI) - for greater security, it is recommended that the option "All meetings using PMI" be activated (Figure 5). The degree of security of this option may be increased by manually creating a password, up to ten characters, defining a degree of greater complexity using alphabetic, numeric and special characters (1);
  • Requires a password for participants to log in by phone - for added security, it is recommended that this option be enabled (Figure 5);
  • Requires encryption for third party endpoints (H323/SIP) - according to ZOOM, communications have some degree of encryption (marked with a padlock in the upper corner of the current meeting screen - Figure 6) between ZOOM platforms. According to the configuration options, so that the same can happen in interaction with other platforms, it is recommended that this option be enabled (Figure 7).
Figure 5
Figure 6
Figure 7

In parallel to these configurations, attention is drawn to two options that may constitute good practices for accessing meetings:
  • Screen sharing - by default, all participants are allowed to share the screen. This option should be assessed by the organiser depending on the context of the meeting (Figure 8);
  • Show the link "Join from your browser" - by default, this option is inactive. Activating this option will allow the participant, by making an assessment of the access and risk conditions, to access the meeting through the web browser instead of installing the client platform (Figure 9). However, this functionality is linked to another option: "Only authenticated users can join meetings from Web client".
  • Only authenticated users can join meetings from Web client - this option, related to the previous one, is found in the first tab "Schedule Meeting" and is active by default (Figure 10). This option implies that even when accessing via a web browser, the guest will have to have a Zoom account to access the meeting. To exclude this condition, the organizer will have to deactivate this option - the guest will access through the provided address and will only be prompted for the meeting ID (filled in by default) and his name.
Figure 8
Figure 9
Figure 10

Schedule meetings (videoconferencing)

When scheduling meetings, both through the online platform and the client application, the following settings deserve some attention:
  • Meeting ID – this identifier will determine the access link to the meeting: it is recommended to opt for its automatic creation for each meeting (Figure 11);
  • Meeting password – it is recommended that this option is always selected. The creation of the password is automatic for each meeting created, but the degree of security of this option can be increased by manually creating a password, up to ten characters, defining a degree of greater complexity using alphabetic, numeric and special characters2;
Figure 11
  • Meeting options – by default, the four meeting options are inactive. It is recommended to enable the "Enable waiting room" option (Figure 12) that will allow access to the meeting only after authorisation from the organiser (Figure 13).
Figure 12
Figure 13

Security at meetings

As of version 4.6.10 (20033.0407) the Zoom platform has a set of tools to increase the level of security in the management of meetings. These tools can be found on the meeting dashboard and are accessible through the "Security" key (Figure 14).

Figure 14
Through this menu, the organiser can manage two important aspects:
  • Enable waiting room – the organiser, if he has not done so in the settings panel (see Figure 12), can manage it from here. It is recommended to activate the option "Enable waiting room" that will allow access to the meeting only after the organiser's authorisation;
  • Lock Meeting – This option allows the organiser, once enabled, to inhibit participants from joining the meeting even if they have been invited. It is recommended to enable the Lock Meeting option to not allow access to new participants other than those currently in the meeting (Figure 15).
Figure 15


*The present recommendations are based on available information and knowledge of the CNCS at the time of their production. They therefore reflect recommendations aimed only at reducing the known security and confidentiality risks in the use of the applications, and do not therefore exclude special additional care, including external care to the use of the platforms with regard to security and protection of user privacy.

(1)(2)On how to generate more secure passwords see:

Last updated on 19-07-2022