zerofox logo

ZeroFox for Zoom Support Documentation

Welcome to our support documentation for the ZeroFox for Zoom application. The intent of this document is to answer common questions on how to use the ZeroFox for Zoom app to identify meetings that don’t meet your organization’s best practice configurations.

Installation

In order to enable Zoom protection, you need to follow the steps described below.

Adding Zoom Accounts

1. Log into https://cloud.zerofox.com using your username and password

2. From the top navigation bar, select Assets. The Assets homepage displays.

3. Click the row in the Assets table corresponding to your asset, or click the Create New Asset Group button.

a. If you clicked the Create New Asset Group button, the New Asset modal displays. Enter your Asset's name and click Save.

4. Click the Accounts & Pages section of the Edit Asset page on the left-hand side.

5. In the Account & Pages section, click the Zoom card at the bottom.

6. The Zoom login screen displays as seen below. You will need to sign into Zoom with your Zoom credentials or via SSO for your company's Zoom account. Make sure to review the requested permissions and hit accept when you’re ready.

7. After logging into Zoom, the Zoom account is added as a Protected Account to your Asset, as shown below.

8. With those steps, the app should be installed!

Uninstalling ZeroFox for Zoom

  1. From the top navigation, select the Assets tab.The Assets homepage displays. 
  2. Select the Zoom asset from above in the Assets table. 
  3. The Edit Asset page displays.
  4. Click on the three dots in the bottom right to expand the menu.
  5. Click on the Remove account option.

Deauthorizing the ZeroFox for Zoom app from your asset page in the ZeroFox platform as described above, or by doing so from Zoom directly will delete all requested data from your ZeroFox platform instance.

Usage

Adding Zoom to the ZeroFox Platform enables you to get alerts and automatically remediate content using the Alerts page. ZeroFox can detect meetings that do not meet security best practices. These best practices include:

Meetings without these configurations are much more likely to be joined by unwanted parties.

Contact Support

FAQ