🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build Network and Endpoint Controls to Block Remote Activation of Collaboration Devices (Zoom Rooms, Teams Rooms) — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.12

Practical, step-by-step guidance for implementing network and endpoint controls to prevent remote activation of Zoom Rooms and Teams Rooms in order to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 SC.L2-3.13.12.

April 21, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Remote activation of collaboration devices (Zoom Rooms, Microsoft Teams Rooms) is a real and growing risk for organizations handling Controlled Unclassified Information (CUI); SC.L2-3.13.12 of NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requires you to build network and endpoint controls that prevent these devices from being activated or commandeered remotely—this post gives practical, implementable network and endpoint controls, real-world small-business examples, and compliance tips to meet the requirement.

Why this control matters and the risk of not implementing it

Unauthorized remote activation of cameras, microphones or room systems can lead to eavesdropping, data leakage, and unauthorized recording of meetings that discuss CUI. Attackers can pivot from a compromised collaboration endpoint into the wider corporate LAN, install persistent backdoors, or use meetings as a conduit for phishing and credential theft. For a small business that stores CUI, the result can be a compromise of contracts, reputational damage, and failed audits against NIST/CMMC.

Understanding the compliance objective (SC.L2-3.13.12)

The control requires preventive measures at both the network and endpoint layers so that remote sessions, remote control features, or cloud management systems cannot activate a device without explicit authorization. The objective is to ensure only approved management channels and authenticated personnel can turn on or control room devices and that any remote-control or auto-join capability is constrained or logged. Your implementation evidence should show configuration settings, access-control lists, network segmentation, and monitoring/alerting supporting this objective.

Network controls to implement (practical details)

Start by isolating collaboration devices on a dedicated VLAN/segment (e.g., VLAN 40 - ROOMS). Apply egress filtering: block all outbound traffic from that VLAN by default and only allow connections to explicitly required FQDNs/IPs and ports used for Zoom/Teams audio/video transport and provisioning. Use DNS filtering (Cisco Umbrella, Pi-hole with allowlists, or firewall FQDN objects) to permit only vendor management domains and your management servers. Example policy pattern for a perimeter firewall: create alias ROOM_VLAN as source -> allow TCP/UDP to approved vendor FQDNs on ports 443, 3478-3481 (UDP/TCP as required) -> deny all other outbound traffic. Keep a short, vendor-maintained allowlist (and reference vendor docs for port requirements) and update it as part of change control.

Endpoint controls and device configuration (practical details)

On the device itself, enforce configuration via MDM (Intune, Jamf) or local policy: disable built-in remote-control features unless explicitly required and only for specific admin accounts. For Zoom Rooms: disable "Allow Remote Control" and restrict Zoom Room provisioning to pre-approved accounts in the Zoom Admin Console; require room passcodes and SSO for room sign-in. For Teams Rooms: apply Teams meeting policy that disables remote control and restricts device management to Intune-enrolled devices with conditional access. Additionally, harden OS-level remote access (RDP/SSH) by disabling services not used, enable host-based firewalls to only permit local management CIDRs, and deploy EDR to detect suspicious processes that attempt camera/mic activation.

Technical examples

Example firewall ACL snippet (pseudo-configuration):
- Create alias ROOM_VLAN (192.168.40.0/24)
- Create alias ZOOM_TEAMS_FQDNS (zoom.us, zoom.com, teams.microsoft.com, *.skype.com) or vendor IP list
- Rule 1: Allow src ROOM_VLAN -> dst ZOOM_TEAMS_FQDNS port TCP/UDP 443, UDP 3478-3481 -> allow
- Rule 2: Deny src ROOM_VLAN -> dst ANY -> log & drop
For a pfSense box this can be implemented with an FQDN alias and two rules; for cloud firewalls use FQDN objects and scheduled updates. On endpoints, use Intune device configuration profiles to push a registry/GPO setting or the vendor-provided setting that disables remote control and auto-join features on room devices.

Small-business real-world scenarios

Scenario A — Small law firm (10 employees): They put their conference-room PC on VLAN 40, created a DNS allowlist for zoom.us and related CDNs using OpenDNS, and used a Unifi firewall to block all other outbound traffic. Zoom Rooms are enrolled via Zoom's account provisioning and the firm turned on "Only authenticated users can join" and disabled remote-control features. They generate audit logs (Zoom audit log, firewall logs) stored centrally for 90 days for evidence during audits.

Scenario B — Small manufacturing shop with a Teams Room: They use Microsoft Intune to enforce device enrollment, apply a Teams meeting policy that disables remote control, restrict device management to a single admin Azure AD group with MFA, and segment the room hardware from industrial control systems. The perimeter firewall only allows Teams media to servers listed in Microsoft's published endpoints, and any attempt to talk to unknown C2 domains from the room VLAN is alerted by the IDS.

Compliance tips and best practices

Document everything: VLAN designs, firewall rules (with timestamps and change records), MDM policies, and vendor admin settings. Maintain a short, change-controlled vendor endpoint allowlist and reference vendor docs for port updates. Implement logging and retention for room-device activity and correlate with network logs: show who signed in to the room, what devices were provisioned, and firewall logs showing allowed/blocked outbound sessions. Test by attempting unauthorized remote activation from a blocked network and capture evidence of the block. Use role-based admin accounts with MFA, and review room-device permissions quarterly.

In summary, meeting SC.L2-3.13.12 requires layered controls: network segmentation and egress filtering to limit where room devices can connect, endpoint configuration to disable or restrict remote activation and remote-control features, and operational controls (MDM, logging, change control and reviews) to demonstrate enforcement. For small businesses this is achievable with common firewalls, DNS filtering, and MDM/enrollment workflows—combined with vendor admin console settings and documented evidence, you can both reduce risk and provide audit-ready compliance artifacts.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes