Warning: This is a friendly reminder that editing the Registry is risky, and it can cause irreversible damage to your installation if you don't do it correctly. In the case you're running Windows 10 Home, you won't have access to the Local Group Policy Editor, but you can prevent Zoom from sending your credentials to a remote host by modifying the Registry. How to fix Zoom sign in credential leak using Registry 5, make sure to clear the exception list. When you no longer need this configuration, you can undo the changes with the same instructions, but on step No. ![]() Source: Windows Central (Image credit: Source: Windows Central)Īfter you complete the steps, Zoom should no longer send your Windows sign-in credentials to a remote host, and you should be able to continue accessing files on a remote server. On the right side, double-click the Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers policy.Browse the following path: Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options.Search for gpedit.msc and click OK to open the Local Group Policy Editor. ![]() Important: This is a temporary workaround, if you configure this policy on a computer joined into a domain or on a device connected to a file-sharing server, such as Network Attached Storage (NAS), you'll have problems accessing the files on the remote computer. To prevent sending your credentials to a remote server with Zoom, use these steps: If you're running Windows 10 Pro (or Enterprise), the easiest way to prevent the credential leak vulnerability while using Zoom is using the Local Group Policy Editor. How to fix Zoom sign in credential leak using Group Policy
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |