Cisco Cisco WebEx Meeting Center WBS29.11 用户指南
Cisco WebEx
Best Practices for Secure Meetings for Hosts
Page 4Page 4
10/6/2014
During the Meeting
Restrict access to
the meeting
the meeting
Lock the meeting once all attendees have joined the meeting. This will prevent additional
attendees from joining. Hosts can lock/unlock the meeting at any time while the session is in
progress.
progress.
To lock a meeting, Select Meeting > Restrict Access.
Tip: This option prevents anyone from joining the meeting, including
participants who have been invited to the meeting but have not yet joined it.
To unlock a meeting, select Meeting > Restore Access
To unlock a meeting, select Meeting > Restore Access
Validate identity of
all users in a call
all users in a call
Accounting for every attendee via a roll call is a secure practice. Ask users to
turn on their video or state their name to confirm their identity.
Please Note:
o
To attend a meeting via phone, a caller only needs to know a valid
WebEx dial-in number and the nine-digit meeting ID. Meeting
passwords do not prevent attendees from joining from the audio
conference portion of WebEx
passwords do not prevent attendees from joining from the audio
conference portion of WebEx
o
If attendees without an account are allowed to join the meeting,
then unauthorized users can identify themselves with any name in
your meeting.
then unauthorized users can identify themselves with any name in
your meeting.
Remove a
participant from
the meeting
participant from
the meeting
Participants can be expelled at any time during a meeting.
Select the name of the participant whom you want to remove, then
select Participant >Expel
Share Content or
Applications, Not
Desktop
Applications, Not
Desktop
Use Share >Application instead of Share >Desktop to share specific
applications and prevent accidental exposure of sensitive information on your
desktop.
desktop.
After the Meeting
Assign passwords
to recordings
to recordings
The best way to prevent unauthorized access to recordings is to not create
recordings.
If recordings must be created, you can edit meeting recordings and add
passwords before sharing them to keep the information secure. Password-
protected recordings require recipients to have the password in order to view
them
protected recordings require recipients to have the password in order to view
them
Delete Recordings
Delete recordings after they are no longer relevant.