Zoom

Configuring access controls for your Zoom resources

Access controls are security measures that are used to control who has access to specific resources within an organization. Zoom offers a variety of access controls that can be used to protect your organization's resources, such as meetings and webinars.
Loved by leading security teams around the world.

Access controls are security measures that are used to control who has access to specific resources within an organization. Zoom offers a variety of access controls that can be used to protect your organization's resources, such as meetings and webinars. This technical reference guide outlines the steps for configuring access controls in Zoom.

Step 1: Sign in to the Zoom web portal

To configure access controls in Zoom, you will need to sign in to the Zoom web portal. To do this, follow these steps:

  • Go to the Zoom website (https://zoom.us).
  • Click on the "Sign In" button in the top right corner of the screen.
  • Enter your email address and password, and then click the "Sign In" button.

Step 2: Set up access controls for meetings

To set up access controls for meetings in Zoom, follow these steps:

  • Click on the "Settings" icon in the top right corner of the screen, and then click "Meetings."
  • In the "Security" section, click the "Edit" button.
  • Follow the prompts to set up access controls for meetings.

Step 3: Set up access controls for webinars

To set up access controls for webinars in Zoom, follow these steps:

  • Click on the "Settings" icon in the top right corner of the screen, and then click "Webinars."
  • In the "Security" section, click the "Edit" button.
  • Follow the prompts to set up access controls for webinars.

Configuring access controls is an important step in protecting your organization's resources in Zoom. By following the steps outlined in this technical reference guide, you can set up access controls that help ensure that your resources are only accessible to authorized users.

Connect, Protect, Defend

Streamline your approach to security posture management throughout your entire company.
Get a Free Security Assessment
By installing or using the software, you acknowledge and agree to be bound by the Terms of Service.