Skip to main content

Getting Started in 5 Minutes

Updated this week

Welcome to Swif! In just three quick steps, you’ll have your first device enrolled, your identity source hooked up, and be ready to roll.

1. Auto-enroll a device via the Silent Installer

Use our silent installer to remove any old MDM profiles and enroll your first Mac or Windows machine into Swif without interrupting the user.
Why? Immediately start collecting device inventory, enforcing policies, and getting visibility.
📥 Deploy Silent Installer (macOS)
📥 Deploy Silent Installer (Windows)


2. Connect Google Workspace Integration

Pull in all your users and groups from Google Workspace so you can assign policies by department, OU, or user role—and track Shadow IT via their Google OAuth logins.
Why? Eliminate manual CSV imports, auto-sync your org chart, and get immediate Shadow IT reporting.
🔗 Set up Google Workspace Integration


3. Connect Microsoft Azure Integration

Bring in your Azure AD users and groups for policy assignments, and track Shadow IT via Azure AD OAuth. You’ll also be able to leverage Conditional Access and SCEP for certificate-based Wi-Fi.
Why? Keep your user directory in sync and enforce device compliance at login.
🔗 Set up Azure AD Integration


Once you’ve completed these three steps, you’ll see devices reporting in, policies applying, and integrations showing green on your dashboard. From there, you can:

  • Create your first policy → enforce password settings, disk encryption, USB controls, and more

  • Explore Reports → event logs, app usage, security alerts, and Shadow IT dashboards

  • Roll out at scale → target device groups, schedule updates, and automate offboarding

Need help? Chat with our team via the in-app messenger or email support@swif.ai. We’re here to make sure your rollout is a breeze!

Did this answer your question?