Home
IT Hub
Zoom

Zoom Security Settings: A Step-by-Step Guide to Lock Down Your Organization’s Meetings

Reco Security Experts
Updated
August 6, 2025
August 6, 2025

As organizations increasingly rely on Zoom for collaboration, IT administrators must ensure that every virtual meeting remains secure and compliant. Zoom has evolved rapidly in response to growing cybersecurity concerns. With features ranging from end-to-end encryption to admin-controlled permissions, it's powerful but only if configured correctly. IT admins must understand how Zoom handles identity, data, access, and third-party integrations to build a secure foundation.

This guide walks IT teams through securing Zoom step-by-step using best practices and configurations.

Common Zoom Security Vulnerabilities

Despite significant improvements in Zoom’s security architecture over the past few years, certain vulnerabilities and misconfigurations still pose risks, especially in enterprise environments. Understanding these vulnerabilities is critical for IT administrators who are responsible for safeguarding user sessions, organizational data, and maintaining compliance.

Below are the most prevalent Zoom security vulnerabilities IT admins should be aware of:

1. Zoom Bombing (Unauthorized Meeting Disruption)

Zoom bombing occurs when uninvited individuals gain access to a meeting and disrupt it, often with offensive or inappropriate behavior. This typically results from meetings being publicly shared without sufficient protection, like passwords or waiting rooms.

Root Causes:

  • Publicly posted meeting links
  • Lack of authentication or registration requirements
  • Disabled waiting rooms or meeting locks

Mitigation Steps:

  • Always require a meeting password or authentication
Settings for Passcode, Waiting Room, and Authentication in Zoom meeting.

Zoom meeting security settings panel with options to enable meeting passcodes, waiting rooms, and authentication requirements for participants.

  • Enable waiting rooms
  • Lock meetings once attendees are present
In-meeting Zoom security controls with Lock Meeting option.

Zoom's in-meeting security menu with options to lock the meeting, enable waiting room, and manage participant permissions.

2. Weak Authentication and Credential Reuse

Users often set weak or reused passwords for their Zoom accounts. Without policies in place, attackers can use credential stuffing techniques (using leaked passwords from other services) to gain unauthorized access.

Root Causes:

  • No enforced password policy
  • Lack of two-factor authentication
  • Users unaware of basic password hygiene

Mitigation Steps:

  • Enforce strong password complexity rules
  • Require 2FA for all users
Zoom admin settings with Two-Factor Authentication enabled for all users.

Admin console in Zoom, where two-factor authentication can be enforced across all user accounts for enhanced login security.

  • Educate users on password reuse

3. Insecure Meeting Configurations

Zoom provides flexible settings, but default or misconfigured options (like enabling screen sharing for all participants or allowing file transfers) can expose organizations to risk.

Examples of High-Risk Configurations:

  • Screen sharing enabled for all participants
  • File transfer allowed without virus scanning
  • Automatic recording without storage security

Mitigation Steps:

  • Limit screen sharing to host/co-hosts
Zoom screen sharing settings showing sharing permissions and desktop sharing option.

Screen sharing settings in Zoom, which let you control who can share their screen and disable desktop sharing to reduce risks during meetings.

  • Disable file transfers unless explicitly needed
Zoom settings screen with File Transfer toggle in the chat section.

The Zoom chat settings panel allows administrators to enable or disable file transfers during meetings to help prevent malware or data leaks.

  • Review and set recording storage to secure cloud locations or encrypted drives
Zoom admin panel with the "Recordings" menu selected and "Local Recordings" tab open.

The Settings tab in Zoom, where admins can manage local recording permissions, storage paths, and security measures for recorded meeting data.

4. Unvetted Third-Party Integrations

Zoom supports numerous third-party apps (e.g., whiteboards, productivity tools), which can access meeting data, participant lists, or recordings. If not carefully vetted, these apps may become vectors for data leakage or compliance violations.

Mitigation Steps:

  • Implement an app approval process
  • Regularly audit installed apps
  • Restrict app installations via the admin console
  • Navigate to the Zoom App Marketplace, and turn on the Pre Approval setting.
Zoom App Marketplace permissions for public and beta/internal apps, showing options for admin approval.

Admin settings in Zoom’s App Marketplace that allow you to manage permissions for public and beta/internal apps, including options to require approval before apps can access meeting data or tools.

5. Outdated Zoom Clients

Running older versions of the Zoom client may leave users vulnerable to known exploits and bugs. Many security patches and feature improvements rely on the latest versions being installed.

Impact:

Exploitation through known vulnerabilities, bypassed security settings, and degraded meeting performance or security.

Mitigation Steps:

  • Enable auto-updates for all users
  • Use device management tools (e.g., Intune, JAMF) to push updates
  • Regularly audit user client versions from the admin portal

6. Poor Incident Response Visibility

Zoom provides reporting and audit tools, but if these are not actively monitored, security incidents may go undetected or unresolved.

Root Causes:

  • No alerts or anomaly detection enabled
  • Lack of integration with SIEM platforms
  • Infrequent log reviews.

Mitigation Steps:

  • Set up security alerts for abnormal login patterns
  • Integrate Zoom logs with SIEM or SOC
  • Establish a regular audit schedule

Why Zoom Security Matters for IT Support Teams

Zoom has become a core tool for business communication used for everything from team stand-ups to confidential board meetings. With this growing reliance, IT support teams are now responsible not just for technical setup, but for protecting company-wide collaboration. A misstep in Zoom configuration can lead to security incidents like unauthorized meeting access, data leaks, or even reputational damage. In fact, during the height of the pandemic, reports of “Zoom bombing” rose by over 400%, often due to unprotected meeting links and weak settings.

Cybercriminals often exploit reused passwords or poorly managed integrations to gain access to Zoom accounts. Once inside, they can view sensitive discussions, download recordings, or impersonate participants. This makes Zoom a potential entry point into broader organizational systems, especially when connected to email, calendars, file-sharing tools, or SSO platforms.

The Strategic Role of IT in Zoom Security

For IT support teams, ensuring Zoom security means enabling secure access, enforcing policy compliance, and training users to avoid risks like phishing or unsafe screen sharing. In regulated industries like healthcare or finance, an unprotected Zoom call can also lead to legal issues under laws like HIPAA or GDPR.

Beyond technology, IT plays a key role in promoting a secure work culture. Setting strong defaults (like passwords, waiting rooms, or 2FA), limiting risky features, and monitoring activity logs help minimize threats. A well-secured Zoom environment not only protects data but also builds trust across teams, clients, and stakeholders by making IT a critical player in business continuity.

Zoom Security Settings Best Practices Checklist for IT Teams

The best practices checklist outlines the most critical Zoom security settings and controls every IT administrator should implement to strengthen their organization’s security posture. Each item includes actionable steps and guidance to help teams enforce consistent protection across users, meetings, and integrations.

1. Restrict Domain Access

Restricting login to your company domain (e.g., @company.com) prevents unauthorized users from creating or accessing accounts on your organization’s Zoom instance.

How to enable:

To implement this security feature when scheduling a new meeting, follow these steps.

  • Schedule a new Zoom meeting.
  • Under "Security," check the box “Require authentication to join”.
Meeting security settings, including options to require authentication to join for specific Zoom users.

Zoom meeting security settings that allow admins to restrict access by requiring participants to authenticate with specific Zoom accounts before joining.

Note: After checking the box, a pull-down menu will appear with three authentication profile options.

You need to select “Zoom users with @company email”.

This will limit attendees to those signed into Zoom with a Company email or an email from another specified domain that you've listed.

2. Require Waiting Rooms or Registration

Waiting Rooms allow hosts to screen participants before they enter. Registration adds an authentication layer by collecting names, emails, and approval options.

How to enable Waiting Rooms:

  • Go to My Account > Settings > Meeting
Zoom account settings for enabling a Waiting Room.

Zoom account settings used to enable the Waiting Room feature, which gives hosts control over participant entry into meetings.

  • Toggle on “Waiting Room”

How to enable Registration:

  • While scheduling a meeting, check “Require Registration”
Meeting scheduling interface in Zoom with the "Registration: Required" option checked.

Zoom meeting scheduling settings, where you can enable participant registration to collect emails and names before granting access to a meeting.

The registration link is the link you want to send to anyone that you want to register for the meeting. After checking the registration required check box, save your meeting. The registration link will appear below the meeting ID.

Meeting summary showing the generated registration link.

A Zoom meeting summary panel that provides the registration link, which you can copy and share after turning on registration for a session.

  • Choose whether to auto-approve or manually approve registrants.
Registration options in Zoom to allow auto-approval or manual review of registrants.

Registration approval options in Zoom allow hosts to automatically approve registrants or manually review participant details before granting access to a meeting.

  • Customize registration questions to collect data like name, email, etc.

3. Limit Screen Sharing and Saving Chat Features

Screen sharing and saving meeting chat can be used to share inappropriate content or leak sensitive information. Restricting them improves meeting control and reduces risk.

How to limit:

Screen Sharing:

  • Go to Account Settings > In Meeting (Basic)
  • Under Screen Sharing, set “Who can share?” to “Host only”
Zoom screen sharing settings under "In Meeting (Basic)" where "Who can share?" is set to "Host only".

Basic meeting settings in Zoom allow you to restrict screen sharing to just the host, preventing unauthorized content from being shown.

In-Meeting Chat:

  • Navigate to Account Settings > In Meeting (Basic)
  • Disable or limit chat options (e.g., allow only host messages)
In-meeting chat settings in Zoom with options to allow users to save chats from the meeting.

Zoom chat controls that let admins decide whether users can save chat messages during meetings to reduce the risks of leaking sensitive information.

4. Enable End-to-End Encryption (E2EE) for Critical Meetings

E2EE ensures that only meeting participants can access the content. Not even Zoom can decrypt the audio/video data.

How to enable:

  • Go to Admin Console > Settings > Security
End-to-End Encryption (E2EE) setting in Zoom.

Zoom admin console settings to enable end-to-end encryption, ensuring meeting content remains private and protected from unauthorized access or spying.

  • Find “Allow Use End-to-End Encryption (E2EE)”
  • Enable and choose a default encryption type for new meetings (Enhanced or E2EE)

⚠️ Note: Some features (like breakout rooms or cloud recording) may be unavailable in E2EE mode.


5. Maintain Update Schedules

Outdated Zoom clients leave your organization exposed to known vulnerabilities and may lack essential security features. Relying on users to update manually introduces inconsistency and risk. Centralized update management ensures all endpoints are running the latest secure versions across the enterprise.

Use Endpoint Management Platforms like Microsoft Intune, JAMF, or SCCM to:

  • Push Zoom client updates automatically to all managed devices
  • Enforce minimum version requirements to block outdated clients from joining meetings
  • Schedule forced restarts where needed to complete installations
  • Monitor client version adoption across users with device compliance reports

Insight by
Dvir Shimon Sasson
Director of Security Research at Reco

Dvir is a Professional Mountains Mover, Dynamic and experienced cybersecurity specialist capable in technical cyber activities and strategic governance.

Expert Insight: Pro Tips for IT Admins Securing Zoom


Basic security settings aren’t enough when Zoom is deeply integrated into your organization's communication stack. Here are expert-level practices IT administrators should consider for advanced protection:

  1. Use SAML SSO with Vanity URLs
    Enforce login through identity providers like Okta or Azure AD using a custom Zoom URL (e.g., yourcompany.zoom.us) to centralize access control and support federated identity.
  2. Revoke Persistent Sessions Regularly
    Zoom access tokens remain active across sessions. Automate session revocation during offboarding and rotate SSO certificates periodically.
  3. Route Logs to Your SIEM
    Ingest Zoom logs into platforms like Splunk or Microsoft Sentinel for real-time anomaly detection and compliance monitoring.
  4. Restrict Third-Party App Scopes
    Limit OAuth permissions for Zoom Marketplace apps and conduct quarterly access reviews to avoid over-privileged integrations.
  5. Isolate High-Risk Meetings
    Use dedicated accounts for board or legal meetings. Enforce E2EE, disable cloud recording, and restrict participants to named users.

These advanced steps help align Zoom with enterprise-grade security frameworks and reduce attack surfaces often overlooked in default configurations.

User Training and Awareness for Zoom Security

Even the best-configured Zoom environment can be compromised by one careless click. That’s why user training is as important as any technical control. IT admins must actively cultivate awareness across the organization to ensure users understand how to use Zoom securely, recognize threats, and avoid common pitfalls.

Here’s how to build a high-impact user training and awareness program:

Create Clear Security Guidelines for Zoom Users

Develop and distribute a concise internal guide outlining:

  • How to host secure meetings (use passwords, waiting rooms)
  • What features to avoid (e.g., public sharing of meeting links)
  • How to report suspicious behavior or meeting disruptions

Distribute this during onboarding and refresh it quarterly.

Run Regular Live and On-Demand Training

Conduct short training sessions every 3–6 months covering:

  • Zoom security best practices
  • Real-world examples of phishing via Zoom links
  • How to manage personal meeting settings safely

Offer on-demand replays for remote teams and late joiners.

Tie Training to Access Policies

Make certain training modules mandatory before users can:

  • Host large external meetings
  • Use features like recording or integrations
  • Join privileged user groups or admin roles

This creates accountability and reinforces the importance of security hygiene.

Conclusion

For IT admins, securing Zoom means going beyond default settings and implementing a structured, policy-driven approach that aligns with your company’s broader security architecture.

By enforcing strong authentication, controlling access, managing updates, monitoring activity, and training users, IT teams can significantly reduce the risk of data breaches, compliance violations, and operational disruptions. The vulnerabilities are real, but so are the tools to fix them.

Zoom security isn’t a one-time setup. It’s an ongoing discipline. The best organizations treat it like any other critical IT system: reviewed, audited, logged, and locked down with intention.

No items found.
EXPERIENCE RECO 1:1 - BOOK A DEMO

Discover How Reco Can Help You Protect Your Zoom Environment

“I’ve looked at other tools in this space and Reco is the best choice based on use cases I had and their dedication to success of our program. I always recommend Reco to my friends and associates, and would recommend it to anyone looking to get their arms around shadow IT and implement effective SaaS security.”
Mike D'Arezzo
Executive Director of Security
“We decided to invest in SaaS Security over other more traditional types of security because of the growth of SaaS that empowers our business to be able to operate the way that it does. It’s just something that can’t be ignored anymore or put off.”
Aaron Ansari
CISO
“With Reco, our posture score has gone from 55% to 67% in 30 days and more improvements to come in 7-10 days. We are having a separate internal session with our ServiceNow admin to address these posture checks.”
Jen Langford
Information Security & Compliance Analyst
“That's a huge differentiator compared to the rest of the players in the space. And because most of the time when you ask for integrations for a solution, they'll say we'll add it to our roadmap, maybe next year. Whereas Reco is very adaptable. They add new integrations quickly, including integrations we've requested.”
Kyle Kurdziolek
Head of Security

Explore More

Ready for SaaS Security
that can keep up?

Request a demo