Deactivate a security policy

Deactivate a security policy

When a security policy is deactivated, the priorities of the remaining policies will be reordered and applied accordingly. Learn more about policy priority.

In the mobile application: 

  1. Open the Zoho One app on your mobile device, then tap  in the top-right corner.
  2. Tap  in the bottom-right corner, then tap Security Policies.
  3. Tap on the security policy you want to deactivate, then use the toggle bar to deactivate it.

In the web application:

  1. Sign in to the Zoho One, then click Directory in the left menu.
  2. Go to Security, then click Security Policies.
  3. Hover over the policy you want to deactivate, then click .
  4. Click Deactivate.

    • Related Articles

    • Manage security policies for users

      Apply a security policy for a single user Sign in to Zoho One , then click Directory in the left menu. Go to Users, then click on a user. Click Security Policies, then either Add User to Policy or Exclude User from Policy. Disable MFA for users Sign ...
    • Delete a security policy

      When a security policy is deleted, the priorities of the remaining policies will be reordered and applied accordingly. Learn more about policy priority. In the mobile application:  Open the Zoho One app on your mobile device, then tap  in the ...
    • Add security policy

      In the mobile application: Open the Zoho One app on your mobile device, then tap  in the top-right. Tap  in the bottom-right, then tap Security Policies. Tap Add, then enter the Policy Name.  Choose the groups the policy will be applied to. To ...
    • Configure password policy

      Passwords are the most commonly used authentication factor. Many users reuse the same, insecure password for all their online accounts, compromising their organization's security. To protect yourself from this common pitfall, make it mandatory for ...
    • Security Policies - Overview

      Security policies are a set of customizable rules that govern how your users can authenticate themselves. They consist of four components: Password policy: This component dictates how strong the users' passwords must be and how often they have to be ...