Data Intune sends to Google

When Android enterprise device management is enabled on a device, Microsoft Intune establishes a connection with Google and shares user and device information with Google. Before Microsoft Intune can establish a connection, you must create a Google account.

The following table lists the data that Microsoft Intune sends to Google when device management is enabled on a device:

Data sent to Google Details Used for Example
EnterpriseId Originated in Google upon binding your Gmail account to Intune. Primary identifier used to communicate between Intune and Google. This communication includes setting policies, managing devices, and binding/unbinding of Android enterprise with Intune. Unique identifier, Example format: LC04eik8a6
Policy Body Originated in Intune when saving a new app or configuration policy. Applying policies to devices. A collection of all configured settings for an application or configuration policy. Policy Body can contain customer information if provided as part of a policy, such as network names, application names, and app-specific settings.
Device Data Devices for Android Enterprise Corporate-Owned Personally-Owned Work Profile scenarios begin with enrollment in Intune. Devices for Managed device scenarios begin with enrollment into Google. Device Data information is sent between Intune and Google for various actions such as applying policies, managing the device and general reporting. Unique identifier to represent Device Name. Example: enterprises/LC04ebru7b/devices/3592d971168f9ae4
Unique Identifier to represent User Name. Example: Enterprises/LC04ebru7b/users/116838519924207449711
Device state. Examples: Active, Disabled, Provisioning.
Compliance states. Examples: Setting not supported, missing required apps
Software Info. Examples: software versions & patch level.
Network Info. Examples: IMEI, MEID, WifiMacAddress
Device Settings. Examples: Information on encryption levels & whether device allows unknown apps.
See the following example of a JSON message.
newPassword Originated in Intune. Resetting device passcode. String representing new password.
Google User Google Managing the work profile for Personally-Owned Work Profile (BYOD) scenarios. Unique identifier to represent the linked Gmail account. Example: 114223373813435875042
Application Data Originated in Intune when saving application policy. Application Name string. Example: app:com.microsoft.windowsintune.companyportal
Enterprise Service Account Originated in Google upon Intune request. Used for authentication between Intune and Google for transactions involving this customer. There are several parts:
Enterprise Id: documented previously.
UPN: generated UPN used in authentication on behalf of customer.
Example: w49d77900526190e26708c31c9e8a0@pfwp-commicrosoftonedfmdm2.google.com.iam.gserviceaccount.com
Key: Base64 encoded blob used in auth requests, stored encrypted in the service, but this is what the blob looks like:
Unique Identifier to represent the customer's key
Example: a70d4d53eefbd781ce7ad6a6495c65eb15e74f1f
Registration Token Originated in Google upon device enrollment. Used to identify device when sending push notifications to the Company Portal app.
User Principal Name (UPN) Only the UPN of the user signed-in to the Intune console initiating the process to connect Google and Intune is sent as a pre-filled hint. Used to prefill the admin email address field of the Google enterprise signup form.

To stop using Android enterprise device management with Microsoft Intune and delete the data, you must disable both Microsoft Intune Android enterprise device management and also delete your Google account. Refer to Google account how to perform account management.