Which Security Setting(s) Should I Use for My Zoom Meeting or Webinar?


U-M Zoom


Which Security Setting(s) Should I Use for My Zoom Meeting or Webinar?


Three Zoom Security Settings to Prevent Uninvited Guests

  • Require authentication to join>University of Michigan Users ("Authentication"): participants are required to log in to a U-M Zoom account in order to join the Meeting or Webinar. Users who are not eligible for a U-M Zoom account cannot join unless provided an Authentication Exception, which can be provided to up to 10 external guests to allow them to bypass the authentication requirement.
  • Waiting Room (only available in Zoom Meetings, not Zoom Webinars): some or all participants are placed in a virtual waiting room and manually admitted to the meeting. Who is placed in the waiting room and who can admit participants from the waiting room is controlled by the waiting room configuration. ITS recommends using the U-M recommended settings for a waiting room.
  • Passcode: participants must enter a passcode in order to join the meeting, or join using a link that includes the passcode encrypted and embedded in it.
    Note: A passcode alone is not sufficient to protect your meeting or webinar. If you use a passcode, you should also use one of the other two settings.

ITS Recommendation

In short, ITS recommends either Authentication or a Waiting Room.

How to decide: who will be attending?

You may use multiple security options for increased security. However, ITS recommends using at least one of the above settings, and not simply a Passcode, as a Passcode is the least secure option.

Instructions for Specific Situations

Additional Information

U-M ITS How to Secure Meetings and Webinars in Zoom

Need additional information or assistance? Contact the ITS Service Center.