Policy must be used by at least one group. Apply policy to another group and try again.
Description
You may encounter this error when you're trying to remove the only applicable group from a security policy.
Reason
Security policies have to be applied to groups in order to affect the members of the groups. Without being applied to a group, a policy would have no use. Therefore, attempting to remove the last applicable group from a policy will result in an error.
Solutions
- If you do not need the policy anymore, delete it.
- If you do not need the policy right now, but may need it in the future, deactivate it.
- If you're planning to apply the policy to a different group, do so before removing this group.
- If you have a specific user who needs to be excluded from the policy, either remove them from the group, or exclude only them from the policy.
Related Articles
Add security policy
In the mobile application: Open the Zoho One app on your mobile device, then tap in the top-right. Tap in the bottom-right, then tap Security Policies. Tap Add, then enter the Policy Name. Choose the groups the policy will be applied to. To ...
Configure password policy
Passwords are the most commonly used authentication factor. Many users reuse the same, insecure password for all their online accounts, compromising their organization's security. To protect yourself from this common pitfall, make it mandatory for ...
Apply an existing security policy to new groups
When applying a policy to a new group, remember to take the policies already applied to the group into account. When a group has multiple security policies, they will be applied based on the policy priority. In the mobile application: Open the Zoho ...
Troubleshooting - Overview
Use these resources to troubleshoot the common issues you may face in Zoho One. Each article will have a description of when you may face the issue, the reason for it's occurrence, and the possible measures you can take to resolve it. If you are ...
Security Policies - Overview
Security policies are a set of customizable rules that govern how your users can authenticate themselves. They consist of four components: Password policy: This component dictates how strong the users' passwords must be and how often they have to be ...