by William Sanders
More than 15 billion active devices connect to global networks — and every single one carries a unique MAC address baked into its hardware at the factory. Knowing how to find your MAC address on Windows is a foundational networking skill, whether you are setting up router-level access control, configuring DHCP reservations, or registering a device on a corporate Wi-Fi network. This guide covers every reliable method, from a single command-line string to the Windows Settings panel, so you pull the correct address on the first attempt every time. Find more Windows how-tos at the PalmGear Tech Tips hub.
Your MAC address — formally the Media Access Control address — is a 12-character hexadecimal identifier assigned to your network interface card (NIC). It operates at Layer 2 of the OSI model, below the IP layer. Unlike an IP address, it does not change when you switch networks. It is embedded in firmware by the manufacturer and persists across reboots, network switches, and full Windows reinstalls.
Windows exposes the MAC address through at least five distinct methods. Each method returns the same underlying value. The choice is speed and context. A sysadmin running an audit script reaches for PowerShell. A home user troubleshooting a router reaches for Settings. This guide maps every path so you choose the right one immediately.
Contents
A MAC address is 48 bits long, rendered as six pairs of hexadecimal digits. You will see it written three ways: A4-C3-F0-85-AC-2D (Windows default, hyphens), A4:C3:F0:85:AC:2D (Linux and macOS, colons), or A4C3.F085.AC2D (Cisco notation). The first three octets identify the manufacturer — called the Organizationally Unique Identifier (OUI). The IEEE maintains the official OUI registry, which you can query to confirm a device's maker from its MAC alone.
The last three octets are assigned by the manufacturer to identify the specific device. Combined, all six octets form a theoretically unique 48-bit address — roughly 281 trillion possible combinations. Every Ethernet card, Wi-Fi adapter, and Bluetooth chip ships with one burned into its firmware at the factory.
The two address types serve completely different layers of the network stack. Conflating them is the most common source of MAC address confusion.
Routers use ARP — Address Resolution Protocol — to map IP addresses to MAC addresses on your local subnet. That ARP table is what makes MAC-based DHCP reservations possible: the router always assigns the same IP to the MAC it recognizes, regardless of how long the lease has been idle.
This is the fastest path. Open Command Prompt — search cmd in the Start menu, no administrator rights required — and run:
ipconfig /all
Scroll to your active adapter. It will be labeled Ethernet adapter Ethernet for wired connections or Wireless LAN adapter Wi-Fi for wireless. The Physical Address line displays your MAC in hyphen-separated format. The entire operation takes under ten seconds.
Alternatively, run getmac /v for a condensed table that lists every adapter name, connection name, and MAC address on one screen. It strips all the IP configuration noise from the ipconfig output and presents only the adapter-to-MAC mappings.
Always cross-reference the adapter name in getmac /v against your active network connection — a machine with both Ethernet and Wi-Fi returns two different MAC addresses, one per physical adapter, and using the wrong one breaks your router configuration.
PowerShell gives you scriptable, parseable output. Open PowerShell and run:
Get-NetAdapter | Select-Object Name, MacAddress, Status
This returns adapter name, MAC, and connection status in a clean table. To filter for currently active adapters only:
Get-NetAdapter | Where-Object {$_.Status -eq "Up"} | Select-Object Name, MacAddress
This is the method for deployment scripts and IT audit tools. It outputs structured objects you can pipe directly into a log file, a CSV export, or an inventory system. The same PowerShell network adapter cmdlets apply to DNS configuration, VLAN tagging, and NIC teaming — making it the single most versatile tool for Windows network management.
No command line needed. Use the Settings app directly:
Windows 11 labels it explicitly as "Physical address (MAC)." Windows 10 surfaces it under the adapter's hardware properties in the same panel. Both paths return the same value. If you are already in the network settings panel and want to audit your saved Wi-Fi credentials, see the guide on how to find your WiFi password on Windows — it covers the same Settings panel from a parallel angle.
MAC filtering is a router-level device whitelist. You input the MAC addresses of every authorized device. Any device presenting an unlisted MAC gets blocked at the access point before it receives an IP. It is a secondary security layer — not a primary one — but it adds meaningful friction against casual intrusion on home networks and small office setups.
To configure it: log into your router's admin panel (typically 192.168.1.1 or 192.168.0.1), navigate to Wireless or Security settings, enable MAC Filtering, and add your Windows machine's physical MAC from the ipconfig /all output. Keep a local record of every device MAC you add. Router admin panels do not always display device names alongside MACs — after a firmware reset, you rebuild the allowlist from scratch without that record.
A DHCP reservation binds a specific IP address to a specific MAC address on your router. Every time your Windows machine connects, the router recognizes its MAC and assigns the same IP — effectively giving you a static local IP without modifying the Windows network adapter configuration.
This is the standard setup for:
DHCP reservations also feed into DNS-level configurations. Once your device holds a fixed IP, you can assign it a local hostname through your router's DNS settings. For the OS side of that configuration, changing your DNS server on Windows walks through the adapter-level and system-level steps that pair with router-side DNS setup.
A typical Windows laptop carries at least two MACs: one for the Ethernet NIC, one for the Wi-Fi card. A desktop with a USB Wi-Fi dongle adds a third. Virtual machines running under Hyper-V or VMware add software-generated adapter MACs on top of the hardware ones. Run getmac /v and document every adapter, not just the one currently active.
Label each entry with the adapter type and the connection it serves. When you configure router MAC filtering, you need both the Wi-Fi MAC for wireless access and the Ethernet MAC for wired access if you regularly switch between them. Registering only one leaves the other connection blocked at the router until you update the allowlist.
Store MAC addresses in a consistent format. Pick one notation and apply it across all your devices. Recommended practice:
A4-C3-F0-85-AC-2DIf you replace a motherboard or NIC, the MAC address changes instantly — any router allowlists, DHCP reservations, or access control policies tied to the old MAC stop working the moment you power on the new hardware, so update them before the swap, not after.
Command-line tools — ipconfig /all, getmac /v, and Get-NetAdapter — return the same MAC value through different output formats. ipconfig outputs full adapter detail including IP, subnet, gateway, and DHCP server. getmac outputs a compact multi-adapter table stripped of IP data. PowerShell outputs structured objects suitable for piping into scripts. None require elevated privileges on a standard Windows installation.
Windows Settings and Device Manager expose MAC addresses without opening a terminal. Settings is the shortest GUI path for single-adapter lookups. Device Manager is the longest but is already the right context if you are in there troubleshooting driver issues. In Device Manager: right-click your adapter → Properties → Advanced → look for Network Address or Locally Administered Address.
| Method | Speed | Admin Required | Shows All Adapters | Scriptable | Best For |
|---|---|---|---|---|---|
ipconfig /all |
Fast | No | Yes | Limited | Quick manual lookup |
getmac /v |
Fast | No | Yes | Limited | Multi-adapter overview |
PowerShell Get-NetAdapter |
Fast | No | Yes | Yes | Scripting, IT automation |
| Windows Settings | Moderate | No | One at a time | No | Non-technical users |
| Device Manager | Slow | No | One at a time | No | Driver troubleshooting context |
Windows creates virtual network adapters for VPNs, virtualization platforms (Hyper-V, VMware, VirtualBox), and Wi-Fi Direct hotspot sharing. These appear in ipconfig /all and getmac /v with their own MAC addresses. They are software-generated values, not hardware-burned identifiers.
Common virtual adapter names to watch for:
When you need the physical hardware MAC for router configuration, scroll past all virtual entries. Your hardware adapters appear simply as Ethernet or Wi-Fi without any virtualization prefix. Virtual MACs fed into router allowlists register the correct device but break if the virtual adapter is removed or the software is reinstalled.
Windows 10 version 1803 and later introduced hardware MAC address randomization for Wi-Fi connections. When enabled, your device broadcasts a software-generated random MAC to the access point instead of the real hardware address. This completely breaks MAC-based DHCP reservations and router allowlists — the router sees a different address on every connection attempt.
Check your randomization setting: Settings → Network & Internet → Wi-Fi → select your network → Hardware properties → look for Random hardware addresses. If it shows "On" or "On (always on)," your router sees a randomized MAC that does not match the hardware address reported by ipconfig /all. Set it to Off for any trusted network where you need deterministic router behavior.
Note that randomization serves a legitimate privacy function. Public Wi-Fi access points can track device presence by logging MAC addresses across sessions. Randomization defeats that tracking. Disable it selectively — only on trusted home and corporate networks where allowlists or DHCP reservations require the hardware address to remain constant.
The claim that every MAC address is globally unique is a design goal, not a guarantee. Manufacturers have shipped duplicate MACs due to factory programming errors — a documented problem that has affected multiple major NIC vendors. The 48-bit address space was also designed decades before 15 billion connected devices existed. IEEE has responded with 64-bit EUI-64 identifiers for newer protocols like IPv6 link-local addressing.
In practice, duplicate MACs on the same Layer 2 subnet cause ARP conflicts and intermittent connectivity failures. The network stack cannot resolve which physical device to send Layer 2 frames to, so packets arrive at the wrong host or drop entirely. On different subnets separated by a router, duplicate MACs are invisible to each other and cause no issues whatsoever.
MAC filtering is not a security control. Any network sniffer — Wireshark, tcpdump, or any standard packet capture tool — captures MAC addresses from unencrypted broadcast and multicast traffic in plaintext. An attacker monitoring your Wi-Fi channel reads your MAC address without authenticating to the network. Cloning that MAC takes seconds using built-in OS tools on any major platform.
MAC filtering stops accidental connections and administrative mistakes. It does not stop determined intrusion. WPA3 encryption is the actual security layer on your wireless network. MAC filtering is access bookkeeping — useful for knowing what is on your network, not for keeping attackers off it. Treat it accordingly and do not rely on it as your primary access control boundary.
Yes. Windows allows you to set a locally administered MAC address through Device Manager or PowerShell. In Device Manager, right-click your adapter → Properties → Advanced → Network Address → enter a 12-character hex value without separators. This overrides the burned-in hardware MAC at the OS level until you remove the override or reinstall the driver. The NIC firmware still holds the original hardware value — the OS override does not modify the chip.
Not inherently. The OUI prefix identifies the hardware manufacturer, not a geographic location. However, Wi-Fi location databases — like those used by OS location services on Windows, iOS, and Android — have historically correlated MAC addresses with physical positions by logging which access points a device connected to and where those access points are geolocated. That is a third-party database correlation, not data encoded in the MAC address itself.
Each physical network interface card has its own independent MAC address. A laptop with an Ethernet port and a Wi-Fi card has two hardware MACs. A USB Wi-Fi dongle adds a third. Virtual adapters created by VPNs, hypervisors, and hotspot sharing add additional software-generated MACs on top of those. Run getmac /v to display every adapter alongside its MAC and connection name in a single compact table.
No. The MAC address is stored in the NIC firmware, not in the operating system. A full Windows reinstall — including a clean format — does not affect the hardware MAC. The only events that change a hardware MAC are physical NIC replacement, motherboard swap when using integrated networking, or a deliberate software override set through Device Manager's locally administered address field.
Your MAC address is the one identity on your network that your router sees before it knows anything else about your device — get it right once, and every access policy you build on top of it holds.
About William Sanders
William Sanders is a former network systems administrator who spent over a decade managing IT infrastructure for a mid-sized logistics company in San Diego before moving into full-time gear writing. His years in IT gave him deep hands-on experience with networking equipment, routers, modems, printers, and scanners — the kind of hardware most reviewers only encounter through spec sheets. He also has a long background in consumer electronics, with a particular focus on home audio and video setups. At PalmGear, he covers networking gear, printers and scanners, audio and video equipment, and tech troubleshooting guides.
You can get FREE Gifts. Or latest Free phones here.
Disable Ad block to reveal all the info. Once done, hit a button below