BB will not activate on new BES

Posted on 2009-12-28
Last Modified: 2012-05-08
I've just brought up a new BES, version 5.0.1
I've activated 4 new devices on the new BES with no other words, the users I've activated so far have received NEW Storm2 devices - first activation for these devices. Before activation,I simply removed their accounts from the old BES, ver. 4.0.6, chose to remove all BB info associated with their mailboxes, created their user accounts on the new BES, and then activated.
The one I'm having trouble activating is also a Storm2, but the major difference is that this device existed on the OLD BES....again, I simply removed the user account, created it again on the new BES, set the password and attempted to activate.
I've even security wiped the new device with no success......I did see some mention of maybe having to delete the hidden BB folders in the user's mailbox ?? ......Any direction on this would be greatly appreciated !!
Question by:ccherman3
    LVL 12

    Accepted Solution

    What is the error message you are getting for activation ?
    Check the BES Event logs and BES Logs.
    LVL 8

    Assisted Solution

    Does the user in the BS 5 have the device PIN associated with the account?  If it does, does the phone show that it is contacting the BES server?  

    If you aren't getting a pin, try re-programming the phone, and then run the activation again.  Have you also tried directly connecting the device to the server via the USB cable, if possible?

    Author Closing Comment

    I wiped the device again, and deleted and recreated the user account on the BES, and it finally activated.

    Thanks to you both for your efforts, I've split the points.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    It still surprises me how many businesses have many of their staff constantly away from the office needing reliable Internet, and without realising it, the answers been in their pocket the whole time! I’m talking, of course, about the phenomenon …
    Have you ever wondered if there is a way to get a message delivery receipt without interrogating the BlackBerry log files or using the Resource Kit tools? It is possible using this tip: When troubleshooting whether a BlackBerry is receiving email…
    Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now