Protection des Données Personnelles avec Microsoft Intune : Comprendre les Collectes et Utilisations (2024)

Introduction

Dans le monde actuel, où la sécurité des données est primordiale, Microsoft Intune se positionne comme une solution de gestion de la mobilité d'entreprise (EMM) incontournable. Cependant, il est crucial de comprendre comment Intune collecte, traite et partage les données personnelles lors de l'enrôlement des appareils. Dans cet article, nous explorons en détail les sources de collecte, les types de données collectées et les implications pour la confidentialité.

Sources de Collecte de Données

1. Utilisation par les Administrateurs

Les administrateurs accèdent à Intune via le Microsoft Intune admin center, fournissant ainsi des données cruciales pour la gestion des services.

2. Appareils des Utilisateurs Finaux

Lors de l'enrôlement et de l'utilisation des appareils, Intune collecte des données provenant de ces derniers, permettant une gestion efficace.

3. Comptes Clients chez des Tiers

À la demande des administrateurs, Intune peut recueillir des informations provenant de comptes clients externes.

4. Informations Diagnostiques et de Performance

La collecte de données diagnostiques, de performance et d'utilisation contribue à améliorer le service de manière continue.

Catégories de Données Collectées

1. Données Requises

Les données requises sont essentielles au fonctionnement du service et comprennent des informations personnelles et non personnelles.

a. Données Client

  • Données personnelles identifiées directement ou pseudonymisées.
  • Données de support et données de compte.
  • Informations de paiement pour la facturation client.

b. Données d'Administration

  • Informations sur les administrateurs, y compris l'ID Active Directory.
  • Données de création d'administrateur, telles que les politiques de conformité et les scripts PowerShell.

c. Données de l'Appareil

  • Informations sur l'appareil, y compris le nom, le type, le modèle et le système d'exploitation.

2. Données Optionnelles

Les données optionnelles, bien que non essentielles, offrent des opportunités d'expériences plus riches.

a. Données Pseudonymisées

  • Collectées à des fins de diagnostic et de télémétrie.
  • Les utilisateurs ont le contrôle sur leur collecte.

Respect de la Vie Privée et Sécurité

Intune s'engage à ne pas vendre les données collectées à des tiers. De plus, certaines données sensibles ne sont ni collectées ni accessibles, préservant ainsi la vie privée des utilisateurs.

Données Non Collectées

  • Historique de navigation et d'appels.
  • Emails personnels, SMS, contacts et mots de passe.
  • Contenu des photos et calendriers personnels.

Conclusion

Comprendre la manière dont Microsoft Intune collecte et utilise les données est essentiel pour garantir la confidentialité des utilisateurs. Avec un engagement envers la transparence et le respect de la vie privée, Intune se positionne comme un choix fiable pour la gestion sécurisée des appareils. Pour en savoir plus sur le stockage, le traitement et le partage des données personnelles, consultez la documentation officielle de Microsoft Intune .

Protection des Données Personnelles avec Microsoft Intune : Comprendre les Collectes et Utilisations (2024)

FAQs

Does Intune spy on you? ›

Intune doesn't collect nor allow an Admin to see the following data: An end users' calling or web browsing history. Personal email. Text messages.

How often do Intune policies refresh? ›

About every 8 hours

How to protect Outlook with Intune policy? ›

Create the Conditional Access policy
  1. Sign in to the Microsoft Intune admin center.
  2. Select Endpoint security > Conditional Access > Create new policy.
  3. For Name, enter Test policy for Microsoft 365 email.
  4. Under Assignments, for Users, select 0 users and groups selected. ...
  5. Also under Assignments, select Target resources.
Jul 18, 2024

What is the Intune app protection exception? ›

As an administrator, you can create exceptions to the Intune App Protection Policy (APP) data transfer policy. An exception allows you to specifically choose which unmanaged apps can transfer data to and from managed apps. Your IT must trust the unmanaged apps that you include in the exception list.

How will I know if my phone is being monitored? ›

New apps that appear without your knowledge, strange messages or notifications, and a slower-running device are also potential signs. Overheating, increased data usage, unusual noises during calls, and difficulties in shutting down the phone could also indicate tracking.

Can device management track you? ›

Device Location History: Beyond just knowing where a device is now, MDM tools can track where it's been. This historical data can be invaluable, offering insights into usage patterns, identifying potential security risks, and helping recover lost or stolen devices by retracing their movements.

How often does Intune check compliance? ›

Right after the enrollment Windows 10 devices checks policies and settings every 3 minutes for 15 minutes, then every 15 minutes for 2 hours, and then around every 8 hours. Already enrolled device checks Intune settings every 8 hours.

How often do phones check in with Intune? ›

By default, Intune devices check in every 8 hours and the Last check-in value also updates every 8 hours in the Intune portal. If Last check in is more than 24 hours, there may be an issue with the device.

How long does it take to wipe a device from Intune? ›

The user must open the app for the wipe to occur, and the wipe may take up to 30 minutes after the request was made.

Can Intune prevent screenshots? ›

If you want to stop taking screenshots on the entire device, you can block the feature at the device level using the Intune device restriction policy. If you want to block screen capture on specific apps like Outlook, etc., you can prevent the feature using an app protection policy.

Is IT possible to enforce Intune policies without enrolling devices? ›

Company Portal app and Intune app protection

Device enrollment is not required even though the Company Portal app is always required. For Mobile Application Management (MAM), the end user just needs to have the Company Portal app installed on the device.

How does Intune protect data? ›

Intune also enables administrators to enforce data protection and compliance through device configuration and compliance policies. These policies allow for the fine-tuning of device settings, authentication methods, VPN configurations, software updates, and security baselines.

How do I remove Intune policies? ›

To remove a policy or a policy group assignment from a device group
  1. To remove a policy or a policy group assignment from a device group.
  2. Go to. Policies. ...
  3. Under the. Policies. ...
  4. Select. Remove. ...
  5. Deselect the device group from which to remove the policy or the policy group. ...
  6. Select.

Is it safe to use Intune? ›

You can protect access and data on organization-owned and users personal devices. And, Intune has compliance and reporting features that support the Zero Trust security model.

Can you turn off Intune? ›

Go to PC Settings > Network > Workplace. Under Workplace Join, select Leave. Under Turn on device management, select Turn off. On the popup window that opens, select Turn off.

Does Intune track user activity? ›

For security purposes, Intune maintains audit logs for user and device actions for one year. These logs are automatically deleted after the one-year retention period. To review audit logs, see Audit logs for Intune activities. Admins can't delete audit logs.

Does Microsoft Intune invade privacy? ›

Your organization can't see your personal information when you enroll a device in Microsoft Intune. Enrolling your device makes certain information, such as device model and serial number, visible to IT administrators and support people with administrator access.

What is monitored in Intune? ›

There are several types of logs that Intune provides: ‍ Audit Logs: These logs track and monitor activities such as policy changes, device enrollment, and app management. They provide a record of actions taken by users and administrators, offering insights into who did what and when.

Can you track devices with Intune? ›

When you use the Locate device action for an Android Enterprise dedicated device that is off-line and unable to respond with its current location, Intune attempts to display its last known location. This capability uses data submitted by the device when it checks in with Intune.

Top Articles
Crypto Top News: Promising Altcoin Picks (JUL 2024)
How Much Will a $400,000 Mortgage Cost You - nesto.ca
Artem The Gambler
Libiyi Sawsharpener
855-392-7812
Dollywood's Smoky Mountain Christmas - Pigeon Forge, TN
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
Shorthand: The Write Way to Speed Up Communication
Seething Storm 5E
Sportsman Warehouse Cda
Clafi Arab
Www Movieswood Com
Braums Pay Per Hour
OnTrigger Enter, Exit ...
Walgreens On Nacogdoches And O'connor
Santa Clara Valley Medical Center Medical Records
Richmond Va Craigslist Com
Cnnfn.com Markets
Beau John Maloney Houston Tx
Best Suv In 2010
Available Training - Acadis® Portal
Walmart stores in 6 states no longer provide single-use bags at checkout: Which states are next?
iZurvive DayZ & ARMA Map
The Grand Canyon main water line has broken dozens of times. Why is it getting a major fix only now?
Mj Nails Derby Ct
Pearson Correlation Coefficient
Accuweather Minneapolis Radar
Parkeren Emmen | Reserveren vanaf €9,25 per dag | Q-Park
Pioneer Library Overdrive
Egusd Lunch Menu
Skidware Project Mugetsu
Pixel Combat Unblocked
15 Downer Way, Crosswicks, NJ 08515 - MLS NJBL2072416 - Coldwell Banker
Orange Pill 44 291
Tamilrockers Movies 2023 Download
Otter Bustr
Pinellas Fire Active Calls
Tillman Funeral Home Tallahassee
2020 Can-Am DS 90 X Vs 2020 Honda TRX90X: By the Numbers
Craigslist Mexicali Cars And Trucks - By Owner
Best Restaurants West Bend
Santa Clara County prepares for possible ‘tripledemic,’ with mask mandates for health care settings next month
St Vrain Schoology
Hampton In And Suites Near Me
Lawrence E. Moon Funeral Home | Flint, Michigan
Joy Taylor Nip Slip
4Chan Zelda Totk
17 of the best things to do in Bozeman, Montana
Billings City Landfill Hours
Coldestuknow
Latest Posts
Article information

Author: Greg Kuvalis

Last Updated:

Views: 6570

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Greg Kuvalis

Birthday: 1996-12-20

Address: 53157 Trantow Inlet, Townemouth, FL 92564-0267

Phone: +68218650356656

Job: IT Representative

Hobby: Knitting, Amateur radio, Skiing, Running, Mountain biking, Slacklining, Electronics

Introduction: My name is Greg Kuvalis, I am a witty, spotless, beautiful, charming, delightful, thankful, beautiful person who loves writing and wants to share my knowledge and understanding with you.