Verification needed for Android Randomized MAC Address fix

%3CLINGO-SUB%20id%3D%22lingo-sub-2220227%22%20slang%3D%22en-US%22%3EVerification%20needed%20for%20Android%20Randomized%20MAC%20Address%20fix%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2220227%22%20slang%3D%22en-US%22%3E%3CDIV%20class%3D%22lia-message-subject-wrapper%20lia-component-subject%20lia-component-message-view-widget-subject-with-options%22%3E%3CSPAN%3EWhen%20using%20Intune%20for%20Android%2010%2B%20there%20is%20currently%20not%20an%20option%20for%20turning%20off%20the%20randomized%20MAC%20address.%26nbsp%3B%20Due%20to%20the%20integration%20with%20Aruba%20ClearPass%20we%20found%20a%20workable%20solution%20but%20need%20help%20with%20load%20testing%20since%20we%20have%20a%20small%20number%20of%20Android%20users.%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%20class%3D%22lia-message-body%20lia-component-message-view-widget-body%20lia-component-body-signature-highlight-escalation%20lia-component-message-view-widget-body-signature-highlight-escalation%22%3E%3CDIV%20class%3D%22lia-message-body-content%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20anyone%20else%20experiencing%20the%20same%20issue%20and%20would%20like%20to%20try%20our%20solution%3F%26nbsp%3B%20The%20one%20we're%20using%20is%20a%20combination%20of%20Intune%20and%20ClearPass%20configurations.%26nbsp%3B%3C%2FP%3E%3C%2FDIV%3E%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2220227%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2235665%22%20slang%3D%22en-US%22%3ERe%3A%20Verification%20needed%20for%20Android%20Randomized%20MAC%20Address%20fix%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2235665%22%20slang%3D%22en-US%22%3EHi%20Lana7%2C%3CBR%20%2F%3E%3CBR%20%2F%3EWe%20are%20experiencing%20the%20same%20issue%20and%20have%20not%20found%20a%20suitable%20work%20around%2C%20would%20you%20mind%20sharing%20what%20your%20workaround%20is%20so%20we%20can%20test%20it%20in%20our%20environment%3F%3CBR%20%2F%3E%3CBR%20%2F%3EThank%20You%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2235881%22%20slang%3D%22en-US%22%3ERe%3A%20Verification%20needed%20for%20Android%20Randomized%20MAC%20Address%20fix%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2235881%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1007384%22%20target%3D%22_blank%22%3E%40KeithL245%3C%2FA%3E%3C%2FP%3E%3CP%3EHi%20Keith%2C%3C%2FP%3E%3CP%3EThe%20configurations%20have%20been%20attached%20to%20this%20post.%3C%2FP%3E%3CDIV%3EPlease%20let%20me%20know%20if%20they%20work%20out%20for%20you%20too.%26nbsp%3B%20Thanks!%3C%2FDIV%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
New Contributor
When using Intune for Android 10+ there is currently not an option for turning off the randomized MAC address.  Due to the integration with Aruba ClearPass we found a workable solution but need help with load testing since we have a small number of Android users.

 

Is anyone else experiencing the same issue and would like to try our solution?  The one we're using is a combination of Intune and ClearPass configurations. 

3 Replies
Hi Lana7,

We are experiencing the same issue and have not found a suitable work around, would you mind sharing what your workaround is so we can test it in our environment?

Thank You

@KeithL245

Hi Keith,

The configurations have been attached to this post.

Please let me know if they work out for you too.  Thanks!

 

@Lana7 Hi Lana, finally got around to trying to attempt your solution with our Androids and have been running into some issues, wondering if you had some time for a meeting to just go over your configuration?