SWARM — New Staff Onboarding Guide

Everything you need to go from zero to productive on the SWARM operator console.

Contents

  1. What is SWARM and how it works
  2. Getting access and signing in
  3. Reading the dashboard
  4. Day-to-day endpoint workflows
  5. Setting up a new machine
  6. Assets and reporting
  7. Escalation and edge cases
  8. Admin tasks
1
What is SWARM and how it works
Background and mental model before you touch anything

What is SWARM?

SWARM (Secure Asset & Remote Management) is the internal MSP operations platform used to monitor managed endpoints, manage client assets, run maintenance and onboarding automation, and feed structured records into HaloPSA for billing and review.

It is not a remote-control tool. SWARM does not open a live session on an endpoint. Instead, it publishes instructions to small control files that agents poll on a schedule, then reads the results back as structured events.

SWARM is an internal operator tool. Clients do not log into it. Everything client-facing goes through HaloPSA.

How it Works — the Polling Model

Understanding the polling model prevents a lot of confusion when things seem slow or unresponsive.

Rule of thumb: after you queue any action, wait at least 5–10 minutes before concluding something is wrong. The agent may simply not have polled yet.

Platform Support

SWARM supports both Windows and macOS endpoints, but the available workflows differ significantly.

Windows

  • Full General Service (25+ tasks)
  • Full System Prep (onboarding)
  • TeamViewer Push (via System Prep)
  • Diagnostics
  • Remote uninstall

macOS

  • macOS General Service (13 tasks, review/maintenance only)
  • TeamViewer Push (standalone workflow)
  • Diagnostics
  • Remote uninstall
  • No full System Prep
When you see an endpoint in SWARM and the System Prep capability shows as Unavailable, it is almost always a macOS machine. This is expected — use TeamViewer Push for those.
2
Getting access and signing in
First-time setup and account roles

Signing In

SWARM uses Microsoft Entra ID (formerly Azure AD) as its primary sign-in method. You will need an active account in the IN2Tech Microsoft 365 tenant.

  1. Navigate to the SWARM URL in your browser.
  2. Click Sign in with Microsoft.
  3. Complete your Microsoft Entra authentication (including MFA if required).
  4. SWARM will create your session and redirect you to the dashboard.
A local username/password fallback exists on the login page but is a feature-flag path used only as a rollback option. New staff should always use the Microsoft sign-in button.

If you cannot sign in, ask an existing admin to confirm your account has been added to SWARM under Settings → Admin → Users.

Operator vs Admin

SWARM has two access levels.

Operator (standard)

Admin

Admin access grants the ability to send email through the configured Graph account and make changes to Halo company mappings. Only grant admin to staff who need it.

The SWARM Browser Helper

The Microsoft quick-service button on the dashboard uses a local protocol handler (swamhelper://) to open Microsoft Admin in a dedicated private browser window. This keeps Microsoft admin work isolated from your normal browser session.

3
Reading the dashboard
What everything on screen means

Dashboard Layout

The SWARM console is a single-page application. There is no page navigation — everything happens within the one view.

Header

The top bar contains: SWARM branding, the Windows installer download link, the help link, a live summary badge showing total endpoint counts, the theme toggle, the manual refresh button, your logged-in name, and logout.

Quick-service strip

A row of coloured shortcut bubbles below the header. These are portal links used throughout the day: Microsoft, PAX8, uSecure, BlackPoint, and SentinelOne. The order is configurable in Settings → Services. The Automations button at the right end of the row opens the automation drawer.

Search and view row

Contains the view toggle (list/card), sort controls, the global search box, clear button, and the Reports export menu.

Left pane — Systems and Assets

The main data area. Tabs along the top switch between Systems, Printers, Networks, and Mobile. The Systems tab shows summary health pills and the endpoint list or card grid.

Right pane — Details

When you click an endpoint, the right pane opens with its full detail: General tab, health data, diagnostics controls, edit mode, and bottom-of-pane actions (Push TeamViewer, uninstall). On narrower screens this panel slides in as an overlay.

Health Badges

Every endpoint in the list has a coloured health badge. Health is calculated automatically from the latest ingest payload.

The metrics that drive the badge are: last check-in time (offline), CPU usage, RAM usage, disk usage, and antivirus state. Thresholds for each are configurable in Settings → Health.

Don't use exclusions to hide problems. Exclusions exist for conditions the team has consciously accepted (e.g. a low-disk server where the situation is understood and managed elsewhere). Using them to clear a badge without a real reason just hides real risk.

Search and Filters

The search box at the top of the list applies instantly across all visible fields.

The summary health pills above the list act as quick filters — click Critical to show only red endpoints, click again to clear.

List View vs Card View

Both views show the same endpoints. Use the toggle in the view row to switch.

You cannot queue General Service or System Prep from card view. If the Automations drawer shows zero selected systems, switch to list view and tick the systems first.
4
Day-to-day endpoint workflows
The tasks you will perform most often

Checking an Endpoint

Clicking any endpoint in the list opens the right-hand details pane. This is your primary view for understanding what is happening on a machine.

General Tab

Shows company, computer name, last user, OS, CPU, RAM, uptime, disk, serial number, IP, and the Last General Service date. The last service date is set automatically when a General Service or System Prep run completes successfully — it is not editable.

Capability Strip

Below the system header, a compact row shows what automation workflows are available for this endpoint.

Check this strip before queuing anything on an unfamiliar endpoint.

Health Tabs

The remaining tabs (Disk, Security, Network, etc.) show the detailed breakdown behind the health badge. Use these to understand why an endpoint is amber or red before deciding on an action.

Running Diagnostics

Diagnostics give you a time-series snapshot of CPU, RAM, disk, and process activity from the endpoint. Use them when you need more context than the last ingest payload provides — for example, to investigate a reported slowness or a suspiciously high CPU reading.

  1. Select the endpoint in the details pane.
  2. Click Run Diagnostics.
  3. Select a duration (how long you want the agent to collect data).
  4. Click Start. SWARM publishes the request immediately.
  5. The endpoint picks it up on the next agent poll — usually within 5 minutes.
  6. The first data packet arrives roughly 2 minutes after the agent starts collecting. Results continue arriving at 2-minute intervals until the run completes.
Diagnostics are agent-driven by design. There is no live or instant view — the agent collects, then posts. The endpoint must be online and polling for results to arrive.

Reset vs Clear Diagnostics

Diagnostics do not resume after a reboot or disconnection. If the endpoint went offline during a run, clear it and start again.

Running General Service — Windows

General Service is the primary maintenance workflow for Windows endpoints. It runs a structured task flow covering health checks, patching, cleanup, and review — all logged back into HaloPSA automatically.

  1. Go to the Systems tab and switch to List View.
  2. Tick the checkboxes next to the systems you want to service.
  3. Click Automations in the quick-service row.
  4. Make sure you are on the General Service tab. Confirm the selected system count is correct.
  5. Choose Start now or set a scheduled time.
  6. Optionally enable Reboot before service — the agent will show a reboot notice to the user and restart before beginning the task flow. The reboot-days threshold is saved in the drawer defaults.
  7. Optionally enable Reboot as needed — allows planned mid-service restarts and automatic resume, needed for update installation that requires a reboot.
  8. Click Queue General Service.
For routine monthly maintenance, enable both reboot options. The endpoint will restart cleanly before servicing and can restart again mid-run if a Windows Update requires it.

What Windows General Service Does

The task flow runs in this order. Power Plan Review always runs first so the endpoint is on High Performance AC settings before any long-running servicing begins.

Monitoring a Run

Open the Automations drawer any time to check on active runs. The General Service tab shows the current run queue with status, elapsed time, and the last reported task.

Cancelling a Run

Running General Service — macOS

macOS The queue process is identical to Windows. Select the Mac in list view, open Automations, and queue from the General Service tab. The difference is in what the agent actually does.

The macOS General Service workflow is conservative — it reviews and performs safe light maintenance only. It does not install OS updates, change firewall or remote-access state, or delete user data.

What macOS General Service Does

Tasks that do not apply to the hardware (e.g. battery check on a Mac mini) are skipped automatically. You will see them marked as skipped in the Halo notes, which is the expected behavior.

Reading General Service Results in Halo

After a General Service run completes, SWARM creates structured entries in the HaloPSA ticket. Understanding what goes where prevents confusion about what the client sees versus what the technician sees.

What the technician sees

What the client sees

Halo ticket workflow

After General Service completes, SWARM moves the ticket to Manager Review status so it is ready for technician sign-off before billing. The technician review email and the Halo action items note are the inputs for that review.

Recurring Service

Recurring Service creates an ongoing company-level schedule rather than a one-off run. Use this for clients who have agreed to regular monthly or quarterly maintenance.

  1. Open the Automations drawer and switch to the Recurring Service tab.
  2. Select the company.
  3. Choose a recurrence interval and optional scheduled time.
  4. Set the reboot policy.
  5. Optionally exclude specific endpoints that should not be included in the company schedule.
  6. Save the schedule.

SWARM stores only excluded systems, not a fixed endpoint snapshot. New machines added to the company later are included automatically unless explicitly excluded.

When the scheduled time arrives, SWARM materialises individual General Service runs for each eligible endpoint — from that point they behave exactly like manually queued runs.

5
Setting up a new machine
Windows System Prep and macOS onboarding

Windows System Prep

System Prep is SWARM's Windows onboarding workflow. It installs, configures, and validates a new Windows machine against the IN2Tech baseline and then automatically runs a follow-on General Service to confirm everything is healthy.

System Prep is Windows only. For macOS, see macOS Onboarding below.

Before you queue

Queueing a System Prep run

  1. Select the new Windows machine in list view. Only one system at a time for System Prep.
  2. Open the Automations drawer and go to the Sys Prep tab.
  3. Review and tick the checklist options. The defaults are pre-set to the standard IN2Tech baseline.
  4. Choose the PDF client: Foxit (default) or Adobe.
  5. Leave Remove existing Microsoft Office unchecked unless you have specifically confirmed that existing Office needs to be wiped. This is a destructive action with a confirmation prompt.
  6. Click Queue System Prep.

What System Prep Does

After prep completes

SWARM automatically queues a follow-on General Service run in the same Halo ticket. This baseline run validates patching state, disk health, event logs, and account security after the prep completes. The combined prep + General Service result is then moved to Manager Review for technician sign-off.

Do not queue a second General Service run manually after System Prep — the follow-on run is automatic. If you queue a duplicate, cancel it from the Automations drawer.

macOS Onboarding — TeamViewer Push

macOS Full System Prep does not run on Macs. The macOS onboarding workflow is TeamViewer Push — SWARM installs TeamViewer Host on the Mac so the team can connect remotely.

The customer must be present and logged in at the Mac when you queue a TeamViewer Push. After installation, macOS will prompt for three privacy permissions that must be approved manually by the user — they cannot be pre-approved remotely.

Queueing a TeamViewer Push to macOS

  1. Confirm the customer is at the Mac and ready to interact with permission prompts.
  2. Select the Mac endpoint in SWARM_DOT_SENTINEL.
  3. Check the Capability Strip — TeamViewer Push should show as Available.
  4. Click Push TeamViewer in the details pane actions.
  5. SWARM queues the push. The Mac agent picks it up on its next poll (within 5 minutes).
  6. The agent downloads TeamViewer Host from the IN2Tech custom permalink, installs it, and assigns it to the company TeamViewer account.
  7. The agent then prompts the customer to approve Screen Recording, Accessibility, and Full Disk Access in System Settings.

The three macOS privacy permissions

Walk the customer through these if they need help:

All three permissions need to be enabled for TeamViewer to function correctly. If the customer misses one, TeamViewer will usually show a permission warning when the first remote session is attempted.

System Prep Results in Halo

SWARM opens a Halo ticket at queue time and posts structured entries as prep progresses.

6
Asset management and reporting
Non-agent assets and data exports

Asset Management

SWARM tracks three categories of non-agent assets: Printers, Networks, and Mobile. These do not self-report — they are created and maintained manually by operators.

Switch between asset tabs using the tab strip above the list. Asset management (create/edit/delete) is available from each asset's detail view.

The search bar works across asset tabs — searching on the Printers tab will search printer records, not endpoints.

Reports and Exports

CSV and XLSX Exports

Use the Reports menu in the view row to export data.

Daily HTML Executive Report

SWARM generates a daily HTML health report automatically and sends it via email to the configured recipient(s). This report gives an executive-level summary of endpoint health across all managed companies.

Monthly Report

The monthly report provides a per-system health trend summary for subscribed companies.

7
Escalation and edge cases
What to do when things don't go to plan

Stalled General Service Runs

A General Service run can stall if the endpoint goes offline, reboots unexpectedly, or loses connectivity during a long-running task. SWARM handles this automatically, but you need to know what to expect.

The disconnection timeout sequence

Cancel & Submit Ticket

If you know the endpoint is not coming back (machine repurposed, client gone offline permanently, etc.) and you want to close the Halo ticket before the 72-hour clock expires:

  1. Open the Automations drawer and find the stalled run.
  2. Click Cancel on the run bubble.
  3. Choose Cancel & Submit Ticket.
  4. SWARM will immediately finalise the Halo ticket with a disconnection-timeout note and send the requester completion email.

SFC / DISM stalls

System File Integrity Check and DISM operations can run for a long time (up to 20 minutes for SFC verify). The launcher posts progress heartbeats every 5 minutes during these phases. If you see a run stuck at System File Integrity Check for more than 30 minutes, check whether the endpoint is still online before concluding something is wrong.

Interpreting the Capability Strip

An endpoint may show Review for a workflow until it submits a full ingest payload containing confirmed platform data. Once a complete payload arrives (usually within one polling cycle after agent install), the capability classification updates automatically.

Common Halo Ticket States

SWARM moves Halo tickets through these states automatically. You don't need to touch them manually in most cases.

If a completed General Service ticket is still showing In Progress in Halo after the run is closed in SWARM, check the Halo ticket timeline to confirm whether the final completion action was posted. If missing, contact the lead technician — do not manually move the ticket status.

Health Exclusions — When to Use Them

Health exclusions suppress specific metrics from contributing to the endpoint's health badge. Available dimensions: antivirus, uptime, CPU, memory, disk.

Do not use exclusions to make a red badge go away without understanding why it is red. Exclusions are for conditions the team has consciously accepted — for example, a server where disk usage is intentionally high and monitored separately, or a machine where antivirus cannot be installed for a documented business reason.

Apply exclusions from the Edit view in the details pane. They are stored against the endpoint record and persist across agent check-ins.

8
Admin tasks
Senior staff and admin-role responsibilities
All tasks in this section require the Admin role. Standard operators will not see the Admin section in Settings.

User Management

Manage SWARM user accounts from Settings → Admin → Users.

You cannot delete your own account. If you need to remove your account, another admin must do it.

Microsoft Graph and Halo Settings

Graph (Email reporting)

The daily executive report and automation completion emails are sent through Microsoft Graph using the configured swam@in2tech.com.au shared mailbox. Graph credentials are stored in the backend environment configuration and are not accessible through the UI.

Admin users can configure the report recipient address and test the Graph send path from Settings → Admin → Daily Report.

HaloPSA Company Sync

SWARM maintains a company registry used to link endpoints and assets to clients. This registry can be synchronised from HaloPSA.

Publishing Signed Agent Scripts

When an agent script changes, it must be re-signed and republished before endpoints will use the new version. Unsigned or hash-mismatched scripts are rejected by the agent.

All Windows publish scripts must be run from an elevated (Run as Administrator) PowerShell prompt. Running without elevation will fail even if the signing certificate is installed correctly.

Windows publish scripts

Each publisher signs the script, regenerates its SHA256 hash file, and updates the associated version file. After publishing, the new version is live — endpoints will pick it up on the next download cycle.

macOS publish path

macOS scripts are published from the MacBook Pro, not from the Windows signing workstation. The Mac uses a separate shell-script signing and build workflow. For notarized installer packages, use the package-specific build and notarization workflow from the MacBook Pro.

Do not attempt to publish macOS scripts from the Windows workstation — the signing certificate and build toolchain are Mac-only.

When to publish

The Hardening Report

The Hardening Report aggregates blocked-task patterns from recent General Service and System Prep runs. It is a development feedback tool for identifying recurring failure patterns that warrant an agent script improvement.

The Hardening Report reads historical blocked-task events from the SWARM database. It is read-only — opening it changes nothing in the system.