Welcome to Swif! In just three quick steps, you’ll have your first device enrolled, your identity source hooked up, and be ready to roll.
1. Auto-enroll a device via the Silent Installer
Use our silent installer to remove any old MDM profiles and enroll your first Mac or Windows machine into Swif without interrupting the user.
Why? Immediately start collecting device inventory, enforcing policies, and getting visibility.
📥 Deploy Silent Installer (macOS)
📥 Deploy Silent Installer (Windows)
2. Connect Google Workspace Integration
Pull in all your users and groups from Google Workspace so you can assign policies by department, OU, or user role—and track Shadow IT via their Google OAuth logins.
Why? Eliminate manual CSV imports, auto-sync your org chart, and get immediate Shadow IT reporting.
🔗 Set up Google Workspace Integration
3. Connect Microsoft Azure Integration
Bring in your Azure AD users and groups for policy assignments, and track Shadow IT via Azure AD OAuth. You’ll also be able to leverage Conditional Access and SCEP for certificate-based Wi-Fi.
Why? Keep your user directory in sync and enforce device compliance at login.
🔗 Set up Azure AD Integration
Once you’ve completed these three steps, you’ll see devices reporting in, policies applying, and integrations showing green on your dashboard. From there, you can:
Create your first policy → enforce password settings, disk encryption, USB controls, and more
Explore Reports → event logs, app usage, security alerts, and Shadow IT dashboards
Roll out at scale → target device groups, schedule updates, and automate offboarding
Need help? Chat with our team via the in-app messenger or email support@swif.ai. We’re here to make sure your rollout is a breeze!