Skip to main content

Why are mobile device management (MDM) systems not able to report on the Randomized MAC Address on some devices?

Written by Josh Franzen
Updated over 2 weeks ago

Starting with Android 10, Google introduced MAC randomization as a default privacy feature. This prevents apps and MDMs (including ArborXR) from tracking a device's permanent hardware identifier across different Wi-Fi networks.

The Technical Limitation

By design, Android masks the true Hardware MAC address. If a device connects to a network manually, it generates a "Randomized MAC" locally. Because this happens at the OS level for privacy, ArborXR cannot "see" or report this randomized address unless it owns the Wi-Fi configuration itself.

The Exception: MDM-Provisioned Networks

If ArborXR (the MDM) creates and pushes the Wi-Fi configuration to the device, the system gains the authority to:

  1. Define the MAC behavior: You can instruct the device to use its "Hardware MAC" instead of a randomized one.

  2. Report the MAC: Once the MDM-provisioned network is active, ArborXR can accurately report the MAC address being used for that specific connection.

πŸ’‘ Click Manage MAC Address Randomization to learn more.

Did this answer your question?