Skip to content

Commit 95a60dc

Browse files
authored
Merge pull request #7308 from Brenduns/privacy-doc-set-sweep
Aged article sweep - Privacy docs
2 parents 167d7db + 40a065f commit 95a60dc

12 files changed

Lines changed: 88 additions & 149 deletions
Lines changed: 42 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
# required metadata
33

4-
title: Optional diagnostic data from Intune Client apps
4+
title: Optional diagnostic data that is collected by Intune client apps
55
titleSuffix: Microsoft Intune
66
description: Learn about the optional diagnostic data that Intune Client apps collect.
77
keywords: privacy, personal data
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 09/15/2020
11+
ms.date: 04/08/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -33,6 +33,7 @@ ms.collection: M365-identity-device-management
3333
# Optional diagnostic data from Intune Client apps
3434

3535
Intune collects various optional data to detect, diagnose, and fix problems from users through various Intune client apps. These optional diagnostic data we collect help to proactively detect problems in your organization so they can be addressed before they become an issue. Intune client apps include:
36+
3637
- iOS/iPadOS Company Portal
3738
- macOS Company Portal
3839
- Windows Company Portal
@@ -43,63 +44,65 @@ Intune collects various optional data to detect, diagnose, and fix problems from
4344
- Android Mobile App Management (MAM)
4445

4546
The optional data collected from clients aren't required to successful run Intune services. The data collected helps:
47+
4648
- Provides enhanced information to help us proactively detect, diagnose, and fix issues.
4749
- Makes product and service improvements.
4850

49-
5051
## Data collected
5152

5253
Optional diagnostic data collected by Intune client apps may cover the following areas:
5354

5455
- Microsoft-generated user information
55-
- Azure AD User ID
56-
- Device ID
57-
- Correlation ID
58-
- App Session ID
59-
- User Session ID
56+
- Azure AD User ID
57+
- Device ID
58+
- Correlation ID
59+
- App Session ID
60+
- User Session ID
6061
- Admin and account information
61-
- Tenant ID
62-
- Azure AD tenant ID
62+
- Tenant ID
63+
- Azure AD tenant ID
6364
- Hardware and software information
64-
- Device OS version
65-
- Device model
66-
- Device make
67-
- Application ID
68-
- User language
69-
- User time zone
65+
- Device OS version
66+
- Device model
67+
- Device make
68+
- Application ID
69+
- User language
70+
- User time zone
7071
- Service events and error information
71-
- Enrollment event
72-
- Failure event
73-
- Network failure
74-
- Runtime failure
75-
- Task schedule failure
76-
- Enrollment failure
77-
- Azure AD authentication failure
78-
- Crash report
79-
- Consent state
80-
- Compliance status
81-
- Policy status
72+
- Enrollment event
73+
- Failure event
74+
- Network failure
75+
- Runtime failure
76+
- Task schedule failure
77+
- Enrollment failure
78+
- Azure AD authentication failure
79+
- Crash report
80+
- Consent state
81+
- Compliance status
82+
- Policy status
8283
- Company Portal events
83-
- Company Portal error
84-
- Company Portal page action
85-
- Company Portal page view
86-
- Company Portal version
84+
- Company Portal error
85+
- Company Portal page action
86+
- Company Portal page view
87+
- Company Portal version
8788
- Performance measurement
88-
- Duration
89-
- Response time
90-
89+
- Duration
90+
- Response time
9191

9292
## Data not collected
93+
9394
The data do not include any customer information, like:
94-
- Device name.
95-
- Phone number.
96-
- Contents to the user’s files or photo.
9795

96+
- Device name
97+
- Phone number
98+
- Contents to the user’s files or photo.
9899

99100
## Turn off data collection
100-
We think there are compelling reasons for people to share this optional data. All optional diagnostic data Microsoft collects during the use of any Microsoft 365 Apps for enterprise applications and services is pseudonymized as defined in the ISO/IEC 19944-1:2020 (section 8.3.3) standard.
101-
Users can [turn off usage data collection](../user-help/turn-off-microsoft-usage-data-collection-android.md) for their individual devices.
102101

102+
We think there are compelling reasons for people to share this optional data. All optional diagnostic data Microsoft collects during the use of any Microsoft 365 Apps for enterprise applications and services is pseudonymized as defined in the ISO/IEC 19944-1:2020 (section 8.3.3) standard.
103+
104+
Users can [turn off usage data collection](../user-help/turn-off-microsoft-usage-data-collection-android.md) for their individual devices.
103105

104106
## Next steps
107+
105108
[Find out more about data collection in Intune.](privacy-data-collect.md)

memdocs/intune/protect/data-apple-sends-to-intune.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 04/19/2018
11+
ms.date: 04/08/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -33,8 +33,6 @@ ms.collection: M365-identity-device-management
3333

3434
# Data Apple sends to Intune
3535

36-
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
37-
3836
When any of the following Apple services are enabled on a device, Microsoft Intune establishes a connection with Apple to share user and device information:
3937

4038
- [Apple Device Enrollment Program (DEP)](../enrollment/device-enrollment-program-enroll-ios.md)
@@ -112,5 +110,4 @@ The following table lists the data that an Apple device sends to Intune. [Intune
112110
| [VPP](https://developer.apple.com/library/content/documentation/Miscellaneous/Reference/MobileDeviceManagementProtocolRef/5-Web_Service_Protocol_VPP/webservice.html#//apple_ref/doc/uid/TP40017387-CH8-SW1) | Apple Business Manager location token | url | The iTunes store URL of an app.|
113111
| [VPP](https://developer.apple.com/library/content/documentation/Miscellaneous/Reference/MobileDeviceManagementProtocolRef/5-Web_Service_Protocol_VPP/webservice.html#//apple_ref/doc/uid/TP40017387-CH8-SW1) | Apple Business Manager location token | User Status | The user status in apple VPP programs. |
114112

115-
116113
To stop using Apple services with Microsoft Intune and delete the data, you must both disable the Microsoft Intune Apple token and also delete your Apple account. Refer to Apple account how to perform account management.

memdocs/intune/protect/data-google-sends-to-intune.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@
33

44
title: Data Google sends to Intune
55
titleSuffix: Microsoft Intune
6-
description: List of data that Google sends to Intune.
6+
description: List of data that Google sends to Intune when Android enterprise device management is enabled with Intune.
77
keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 04/18/2018
11+
ms.date: 04/08/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -32,20 +32,14 @@ ms.collection: M365-identity-device-management
3232

3333
# Data Google sends to Intune
3434

35-
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
36-
3735
When Android enterprise device management is enabled on a device, Microsoft Intune establishes a connection with Google and user and device information is shared between Intune and Google. Before Microsoft Intune can establish a connection, you must create a Google account.
3836

39-
The following table lists the data that Google sends to Intune when device management is enabled on a device:
40-
37+
The following table lists the data that Google sends to Intune when device management is enabled on an Android device:
4138

4239
| Data Google sends to Intune | Details | Used for | Example |
4340
|:---:|:---:|:---:|:---:|
4441
| Enterprise data | Customer's enterprise identifiers in Google. | Links the customer's information between Intune and Google. | **enterpriseId** example: LC04eik8a6.<br>**Name**. The Administrator name as entered when configuring Android enterprise. Example: Joe Smith.<br>**Admin email**. [email protected] that was used when configuring Android enterprise. |
4542
| Application data | Data for managed Play Store applications. | Targeting the application to users or devices as available or required. | **Application Name** example: Contoso Warehouse Inventory Application.<br>**Unique Identifier to represent application** example: app:com.Contoso.Warehouse.InventoryTracking |
4643
| Service account | Unique internal Google service account for use with specific customer calls. | Used for making calls into Google on the customer behalf (to view apps, devices, and more) | **Name** example: [email protected].<br>**Keys** example: ServiceAccountPassword |
4744

48-
49-
To stop using Android enterprise device management with Microsoft Intune and delete the data, you must both disable the Microsoft Intune Android enterprise device management and also delete your Google account. Refer to Google account how to perform account management.
50-
51-
45+
To stop using Android enterprise device management with Microsoft Intune and delete the data, you must both disable the Microsoft Intune Android enterprise device management and also delete your Google account. Refer to Google account how to perform account management.

memdocs/intune/protect/data-intune-sends-to-apple.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 02/26/2018
11+
ms.date: 04/08/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -33,9 +33,7 @@ ms.collection: M365-identity-device-management
3333

3434
# Data Intune sends to Apple
3535

36-
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
37-
38-
When any of the following Apple services are enabled on a device, Microsoft Intune establishes a connection with Apple and shares user and device information with Apple:
36+
When any of the following Apple services are enabled on a device, Microsoft Intune establishes a connection with Apple and shares user and device information with Apple:
3937

4038
- [Apple Device Enrollment Program (DEP)](../enrollment/device-enrollment-program-enroll-ios.md)
4139
- [Apple MDM Push certificate (APNS)](../enrollment/apple-mdm-push-certificate-get.md)

memdocs/intune/protect/data-intune-sends-to-google.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@
33

44
title: Data Intune sends to Google
55
titleSuffix: Microsoft Intune
6-
description: List of data that Intune sends to Google.
6+
description: List of data that Intune sends to Google when Android enterprise device management is enabled with Intune.
77
keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 11/16/2020
11+
ms.date: 04/08/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -32,8 +32,6 @@ ms.collection: M365-identity-device-management
3232

3333
# Data Intune sends to Google
3434

35-
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
36-
3735
When Android enterprise device management is enabled on a device, Microsoft Intune establishes a connection with Google and shares user and device information with Google. Before Microsoft Intune can establish a connection, you must create a Google account.
3836

3937
The following table lists the data that Microsoft Intune sends to Google when device management is enabled on a device:
@@ -49,7 +47,4 @@ The following table lists the data that Microsoft Intune sends to Google when de
4947
| Application Data | Originated in Intune when saving application policy. | | Application Name string. Example: app:com.microsoft.windowsintune.companyportal |
5048
| Enterprise Service Account | Originated in Google upon Intune request. | Used for authentication between Intune and Google for transactions involving this customer. | There are several parts:<br> **Enterprise Id**: documented previously.<br>**UPN**: generated UPN used in authentication on behalf of customer.<br>Example: w49d77900526190e26708c31c9e8a0@pfwp-commicrosoftonedfmdm2.google.com.iam.gserviceaccount.com<br>**Key**: Base64 encoded blob used in auth requests, stored encrypted in the service, but this is what the blob looks like:<br> Unique Identifier to represent the customer's key<br>Example: a70d4d53eefbd781ce7ad6a6495c65eb15e74f1f |
5149

52-
53-
To stop using Android enterprise device management with Microsoft Intune and delete the data, you must both disable the Microsoft Intune Android enterprise device management and also delete your Google account. Refer to Google account how to perform account management.
54-
55-
50+
To stop using Android enterprise device management with Microsoft Intune and delete the data, you must both disable the Microsoft Intune Android enterprise device management and also delete your Google account. Refer to Google account how to perform account management.

memdocs/intune/protect/data-jamf-sends-to-intune.md

Lines changed: 5 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 01/16/2019
11+
ms.date: 04/08/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -33,61 +33,12 @@ ms.collection: M365-identity-device-management
3333

3434
# Data Jamf Pro sends to Intune
3535

36-
When you use [Jamf Pro](https://www.jamf.com) to manage your end-users Macs
37-
with Intune, Jamf Pro captures inventory information about managed macOS devices.
36+
When you use [Jamf Pro](https://www.jamf.com) to manage your end-users Macs with Intune, Jamf Pro captures inventory information about managed macOS devices.
3837

39-
## Data
40-
For the list of data that Jamf Pro shares with Intune, see [Appendix: Inventory Information Shared with Microsoft Intune](https://docs.jamf.com/technical-papers/jamf-pro/microsoft-intune/10.9.0/Appendix__Inventory_Information_Shared_with_Microsoft_Intune.html) in the Jamf Pro technical documentation.
41-
42-
<!--
43-
Jamf Pro reports the following information to Intune:
38+
## Data
4439

45-
* Device Azure AD ID
46-
* JAMF Inventory State (inventory state of a computer checked in with Jamf Pro within the last 24 hours)
47-
* OS Version
48-
* User Azure AD ID
49-
* Encrypted (FileVault 2)
50-
* Gatekeeper Status
51-
* Password: minimum number of character sets
52-
* Password expiration (days)
53-
* Password Type - simple, alphanumeric, or unknown
54-
* Prevent Auto Login
55-
* Required Passcode Length
56-
* Password: number of previous passwords to prevent reuse
57-
* System Integrity Protection
58-
* Last Check-In Time
59-
* Architecture Type
60-
* Available RAM Slots
61-
* Battery Capacity
62-
* Boot ROM
63-
* Bus Speed
64-
* Cache Size
65-
* Device Name
66-
* Domain Join
67-
* Jamf ID
68-
* MAC address
69-
* Make
70-
* Model
71-
* Model Identifier
72-
* NIC Speed
73-
* Number of Cores
74-
* Number of Processors
75-
* OS
76-
* Platform
77-
* Processor Speed
78-
* Processor Type
79-
* Secondary MAC Address
80-
* Serial Number
81-
* SMC Version
82-
* Total RAM
83-
* UDID
84-
* User Email
85-
-->
86-
87-
<!--
88-
You can remove a Jamf-managed device from the Intune console by selecting **Delete** in the **All devices** view. Bulk device deletion can be enabled by selecting multiple devices and clicking **Delete**.
89-
-->
40+
For the list of data that Jamf Pro shares with Intune, see [Appendix: Inventory Information Shared with Microsoft Intune](https://docs.jamf.com/technical-papers/jamf-pro/microsoft-intune/10.9.0/Appendix__Inventory_Information_Shared_with_Microsoft_Intune.html) in the Jamf Pro technical documentation.
9041

9142
## Next steps
92-
Get information on how to [remove a Jamf-managed device in the Jamf Pro docs](https://www.jamf.com/jamf-nation/articles/80/unmanaging-computers-while-preserving-their-inventory-information). You can also file a support ticket with [Jamf support](https://www.jamf.com/support/) for additional help.
9343

44+
Get information on how to [remove a Jamf-managed device](https://docs.jamf.com/technical-papers/jamf-pro/microsoft-intune/10.9.0/Deleting_a_Computer_from_the_Microsoft_Azure_and_Intune_Portals.html) from Intune and Azure Active Directory. You can also file a support ticket with [Jamf support](https://www.jamf.com/support/) for additional help.

memdocs/intune/protect/privacy-data-audit-export-delete.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
# required metadata
33

4-
title: Audit, export, or delete personal data
4+
title: Audit, export, or delete personal data collected by Intune
55
titleSuffix: Microsoft Intune
6-
description: Learn how to audit, export, or delete personal data.
6+
description: Learn how to audit, export, or delete personal data that's been collected by Intune.
77
keywords: GDPR, personal data, privacy
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 9/10/2020
11+
ms.date: 04/08/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -39,7 +39,7 @@ Intune admins can use audit logs to track activities surrounding personal data.
3939

4040
Audit logs provide tenant admins with a record of activities that generate a change in Microsoft Intune. Audit logs are available for many manage activities and typically create, update (edit), delete, and assign actions. Remote tasks that generate audit events can also be reviewed. These audit logs may contain personal data from users whose devices are enrolled in Intune.
4141

42-
For security purposes Intune may maintain audit logs for user and device actions for a period of one year. These logs are automatically deleted after the one-year retention period.
42+
For security purposes Intune may maintain audit logs for user and device actions for one year. These logs are automatically deleted after the one-year retention period.
4343

4444
To review audit logs, see [Audit logs for Intune activities](../fundamentals/monitor-audit-logs.md).
4545

@@ -51,13 +51,15 @@ These audit events are retained for one year. Tenant admins can request audit lo
5151

5252
Admins can export end user personal data, including accounts, service data, and associated logs to comply with Data Subject Rights requests. It's up to you and your organization to decide whether or not to provide the data subject with a copy of the personal data or if you have a legitimate business reason to withhold it. If you decide to provide it, you can provide them with a copy of the actual document, an appropriately redacted version, or a screenshot of the portions you have deemed appropriate to share.
5353

54-
To export a user's personal data, you can use:
55-
- the Intune MDM Device blade to export a list of devices. You can also copy device data directly.
54+
To export a user's personal data, you can use:
55+
56+
- the *Export* option on the *All devices* node of the Microsoft Endpoint Manager admin center to export a list of devices. You can also copy device data directly.
5657
- the [Export-IntuneData.ps1 script](https://aka.ms/intunedataexport).
5758

5859
## Delete end user personal data
5960

6061
There are three ways to remove personal data from Intune management:
62+
6163
- Delete the user from Azure Active Directory
6264
- Reset the device to factory settings
6365
- User self-removal
@@ -67,12 +69,15 @@ There are three ways to remove personal data from Intune management:
6769
To delete an end user's personal data from Intune, an admin must [delete the user from Azure Active Directory (Azure AD)](/azure/active-directory/fundamentals/add-users-azure-active-directory#delete-a-user). When the user is deleted from Azure AD (hard deleted), Intune receives the delete signal from Azure AD and then automatically begins purging all of that user's personal data from the Intune service. The user's information will be deleted from Intune service within 30 days of the removal action.
6870

6971
### Reset device to factory settings
70-
Resetting to factory settings restores all company and personal data and settings to the original factory settings. It is useful for providing a device to the next employee. User files, user installed applications, and non-default settings are removed and this data is deleted from the Intune service within 30 days of the removal action.
72+
73+
Resetting to factory settings restores all company and personal data and settings to the original factory settings. It's useful before providing a device to the next employee. User files, user installed applications, and non-default settings are removed and this data is deleted from the Intune service within 30 days of the removal action.
7174

7275
### User self-removal from Intune management
73-
Users can remove their [Android, Apple, or Windows](../user-help/unenroll-your-device-from-intune-android.md) personal device from Intune management without admin assistance.
76+
77+
Users can remove their [Android](../user-help/unenroll-your-device-from-intune-android.md), [Apple](../user-help/unenroll-your-device-from-intune-ios.md), or [Windows](../user-help/unenroll-your-device-from-intune-windows.md) personal device from Intune management without admin assistance.
7478

7579
### Retire
80+
7681
The **Retire** action removes Intune provisioned data like company applications, data about apps that Intune is managing, policy settings, and email profiles that are provisioned through Intune. This action leaves the user's personal data on the device.
7782

7883
### Delete a tenant from Microsoft Intune

memdocs/intune/protect/privacy-data-collect.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords: privacy, personal data
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 11/01/2020
11+
ms.date: 04/08/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: protect

0 commit comments

Comments
 (0)