Forum Discussion
Teams Abusive behaviour on video calls
One suggestion - it won't stop it happening but will help in proving who the culprit is for whatever behaviour sanctions your school is running at the moment:
You (or whoever has Teams admin rights) can go onto the Teams Admin centre (https://admin.teams.microsoft.com/), then Users, then pick a teacher whose lessons are suffering, then Call History, pick one of the calls that was being "teamsbombed", and you can then see all the participants. You can then click on some of the guest ones and look through the data and you'll find device name in there which is normally a give-away of who it is. Otherwise if you go onto the Debug tab and look for Connectivity_LocalSite it will give their IP address, you can compare this to students who are logged in as evidence of who is doing it.
When I look through the debug data I can see the client is the webclient, when I lookup the Connectivity_LocalSite ip it resolves to Microsofts subnets, it is also evident in those debug logs that the webclient runs on VMs in Microsofts infrastructure quite fascinating reading really.
I did take the IP and look it up on cloud app security just to confirm my suspicions.
I might log a ticket is MS support to see if there's a way I can resolve a web client anonymous user back to a real IP.
In your case were students using the full app?
- CoasterKatyFeb 12, 2021MVP
Zer0 Ah that's annoying, when I had a look through it must have been a desktop client user I had picked on as that value was lookup up as an ISP.
In my case they were using an iPhone called "Name's iPhone" so it was obvious who it was (as the names weren't all that common), and the IP addresses matched.