You may need to re-enroll the Mobile Encryption device because it received a bad policy setting or it's not updating policy settings like it should.
The following text was taken from the Symantec Mobile Encryption for iOS Users's Guide, Chapter 2:
Re-enrolling to a Symantec Encryption Management Server
To change your server settings, you can "reset" the account settings by re-enrolling. Use this option if you need to change the Symantec Encryption Management Server connection information.
Tip: You will need to re-enter the account settings. Be sure you have this information (server IP address, your user name, password, and so on) before you begin.
1 Open Symantec Mobile Encryption for iOS.
2 Tap Settings.
3 Tap Account.
4 Tap Reset Account Settings.
Enrollment Guidelines for Symantec Encryption Management Servers running in DMZ Mode, not hosting Private Keys:
Hosting Private Keys is a requirement for Enrollment to succeed, as well as update policies. If users are allowed to enroll to Symantec Encryption Management Server, running in DMZ mode, unexpected consequences can take place. For more information on this behavior, and guidelines for this scenario, see article TECH240575.
Although Enrollment and Policy updates must not be initiated to/from cluster nodes not hosting private keys, these nodes can still be used to lookup keys with the keyserver service. There is also a preference which can be configured on Symantec Encryption Management Server, which will allow multiple keyservers to be used to do key lookups should one of the nodes not be available.
As per the Symantec Encryption Management Server 3.4.1 Admin Guide, an XML configuration file can be used to add this additional keyserver.
To do so:
Login to Symantec Encryption management server.
Click on the consumer policy applicable.
Click on the General Edit button.
Click on Edit Preferences... button.
For the Pref Name field, enter secondaryKeyserver.
For the Value, enter the FQDN of the other Symantec Encryption Management Server that can be queried for keys in case the primary server is unavailable.
Click Save, and update policy on the mobile device to pull down this new policy.
Caveat: Currently, this secondaryKeyserver option only works when a specific Encryption Server is always accessed and only fails over to the secondary if the primary node is unavailable. If node 2 is unavailable, there is no option to failover to node 1.
Symantec Mobile Encryption for iOS
Symantec Encryption Management Server
iOS 5 or iOS 6
Imported Document ID: TECH202026
Subscribing will provide email updates when this Article is updated. Login is required.