Search2 Results

Three methods for securing a Zoom meeting against unwanted participants — restricting access to Bowdoin accounts, enabling a waiting room for public meetings, and requiring a passcode.
Steps a Zoom host or co-host can take during an active Zoombomb attack — including using the Security button, removing participants, muting controls, stopping screen shares, and locking the meeting.