Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.



* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them

Secure your data and stay compliant while employees work from home. Remote deployment in 30 minutes.

Endpoint Protector Knowledge Base

Below you can explore FAQs related to Endpoint Protector and find the information you need. For any other additional questions, suggestions, and improvements please contact the support team.

Why did the MAC Address change after upgrading the Windows Endpoint Protector Client to version 5.2.2.9?

Endpoint Protector 5.2.0.8 brings several new features, improvements and bug fixes. The full list of the Release Notes can be found here.

Changes include additional Computer information like Main MAC Address and MAC Address List. This means that not just a MAC Address will be reported to the Endpoint Protector Server, but the entire lists of MAC Addresses, from LAN networks, to WiFi cards, USB external modems, etc. As such, a greater visibility regarding the endpoint is available.

With this new reprioritization and extra information, in some circumstances, the previous information displayed in the MAC Address filed may not match the information currently available in the Main MAC Address.

This could be particularly visible in scenarios when users are in a home office environment. If this situation occurs, the MAC Address will be listed in the MAC Address List.

This improvement provides a better network overview and, it provides the possibility to correlate the information within Endpoint Protector with the information from other solution in your network, such as Inventory Management, AV, Firewalls, etc.

Note: In some cases, a similar behavior where the Main IP information is reprioritized can occur. All IPs can be found in the IP List.
Was this article helpful?
YES NO
Can you please tell us how we can improve this article.
Thank you for your feedback!