Enable the “Waiting Room” feature for your meetings.Allow guests to join once the host or alternative hosts have arrived. The host and alternative host can see who is attempting to join the meeting before allowing them access.
Lock the meeting.You can also lock the meeting once everyone has joined to prohibit outsiders from joining and assign at least two meeting co-hosts. The co-hosts will be able to help control the situation in case anyone bypasses your efforts and gets into the meeting.
To deputize your co-hosts, go to the same Settings icon, then to the Meetings tab. Scroll down to Co-host and make sure it is enabled. If Zoom asks you for verification, click Turn On.
All file transferring, annotations and the autosave feature for chats
Keep your Zoom software client updated.
Zoombomb Victim Actions
Lock them out.Go to the Participants List in the navigation sidebar, and scroll down to More. Click Lock Meeting to stop further participants from entering the meeting and to be able to remove participants.
Shut them up.Have yourself or one of your co-hosts go to the Participants List, again scrolling down to the bottom, and click Mute All Controls. This makes it so the unwelcome participant can’t use their microphone to disrupt your audio.
Let IT Security know about it. Send an email to email@example.com detailing as much about what occurred and how your resolved it. If you have experienced unwanted behavior, we’d like to know about it so we can continually improve our institutional (default) security settings and on-going recommendations to our users. Thank you!
Information Technology is located in Watzek Library on the Undergraduate Campus.