Microsoft Teams – Secure Meetings Guide

Microsoft Teams meetings are now widely used across HYMS and beyond, making it essential to ensure that your sessions are secure for both hosts and participants. Microsoft provides a range of options to help you control access, manage participant behaviour, and protect meeting content. This guide explains how to configure and manage secure Teams meetings effectively.

1. Before the Meeting

To protect your meeting from unwanted access, never post meeting links publicly, such as on social media or open websites. If an event requires wider visibility, ask potential attendees to pre‑register and send meeting details only to vetted participants.

2. Setting Secure Meeting Options

Each scheduled Teams meeting includes a Meeting options panel that allows organisers to control the lobby, presenters, and access permissions.

2.1 How to access Meeting Options

You can open Meeting options in two ways:

  • From the Teams meeting invite details
  • From the meeting information inside the calendar event

Meeting options allow organisers to:

  • Prevent unauthorised users from joining
  • Control lobby behaviour
  • Manage who can present
  • Manage admission notifications

Suggested defaults for secure meetings

Who can Present

By default, in a Teams meeting, HYMS users (those signed in with a HYMS account) join as presenters and can share their screen. External users — including NHS, Hull, and York attendees — join as attendees and are unable to present unless their role is changed.

3. During the Meeting

Teams provides several real‑time controls to help you maintain a secure environment.

3.1 Accessing participant controls

To manage participants:

  1. Select People from the meeting bar.
  2. Hover over a participant’s name.
  3. Select More options (…).
  4. Choose an appropriate control.

3.2 Participant management tools

You can perform the following actions:

  • Mute – Silence a participant’s microphone.
    Useful for managing noise or disruptions.
  • Pin – Pin a participant so their video remains visible to you.
  • Spotlight – Make a participant’s video the main focus for everyone in the meeting.
  • Make Attendee / Make Presenter –
    • Attendees cannot present or share their screen.
    • Presenter can present and share content.
  • Remove from meeting – Immediately eject a user from the meeting.

Note:

Participants you remove can re‑join unless additional restrictions are applied.

4. Best Practices for Secure Meetings

4.1 For meeting organisers

  • Enable the lobby for all users  – To ensure you control who enters.
  • Restrict presenting rights  – To prevent accidental or malicious screen‑sharing.
  • Remove disruptive users immediately – Using the participant controls.

4.2 For public or external‑facing sessions

  • Always vet registrants before sharing meeting links.
  • Consider using a waiting room (lobby) for manual admission.
  • Use “attendee” mode for non‑presenting guests.

5. After the Meeting

  • Review meeting chat and shared files.
  • Remove any guest access that is no longer required.
  • Save or delete recordings according to organisational policies.

6. Summary

A secure Microsoft Teams meeting relies on:

  • Sharing links responsibly
  • Configuring Meeting options correctly
  • Actively managing participants during the session

Using the tools provided in Teams helps ensure your meeting remains controlled, professional, and safe for all participants.

Updated on 10/02/2026
Was this article helpful?

Related Articles