Solved

How to remove enterprise activation?

Posted on 2008-09-29
4
2,334 Views
Last Modified: 2011-10-03
Hi Experts..
I use my berry day to day in a BIS setup.
I ran thru a test enterprise activation to test a BES server install, which worked, now im setup for BIS and BES.

How do I remove the BES activation and return back to how I was?
(hopefully keeping all my old customizations im keen not to have to wipe my device in the process)
Cheers
Wilson


0
Comment
Question by:wilsonkjit
  • 2
  • 2
4 Comments
 
LVL 5

Expert Comment

by:amorgan2000
ID: 22596022
You should be able to do this by deleting the BES service Books.  Go to Options | Advanced Options | Service Books and delete anything named Desktop.  Desktop is the generic name of the service that BES uses.  You might want to resend your service books from BIS just in case you accidently deleted one that you need.  
0
 

Author Comment

by:wilsonkjit
ID: 22602085
Thanks for the reply. I like your thinking.
Will that break the abilty to Enterprise Activate to other BES servers in the future though?.
As a IT Consultant building SBS networks reguarly, and BES servers semi regularly I need the ability to test with my own Berry to verfiy BES server built properly.
Then remove this but not stuff up the phone for the next test.
Cheers
WIlson







0
 
LVL 5

Accepted Solution

by:
amorgan2000 earned 500 total points
ID: 22604709
No deleting the service books from the BES will only prevent you from sending/receiving mail through that source.  You can still Enterprise Activate again.  

You could also consider getting your device the way you want it.  Then before you activate it on a BES do a backup, Enterprise Activate then play around.  If everything is fine secrutiy wipe and restore your backup.  That should work also.  You would lose any e-mail your device received from the BIS between backup and restore.
0
 

Author Closing Comment

by:wilsonkjit
ID: 31501137
Yes it worked a treat thanks
Wilson
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When a user’s mailbox is first created and his Blackberry account enabled how do we provision the device and what happens in the background? Stage 1 – Activation The user of the BlackBerry device types the email address and activation password i…
Last night I received a weird phone call, from a number I didn’t recognized.  I answered it and no one responded back so I hung up.   Didn’t look at my phone until my husband said “Your phone is doing something weird”.   I had what I’ll consider the…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now