Inspect devices
smplify device list
smplify device search --os windows --status vulnerable --output json
This path gets a new user from first install through authentication, tenant selection, and a safe first device or remediation command without relying on hidden state or UI-only context.
Use the branded endpoint for the standard path so docs, rollout guides, and terminal commands all point to the same first-party surface.
curl -fsSL https://cli.smplify.com/install.sh | sh
Authenticate first so the CLI can persist the session and inject the right auth headers into subsequent requests.
smplify auth login
smplify auth status
Choose the active tenant before day-to-day operations so device and admin commands execute in the intended context.
smplify tenant list
smplify tenant use <tenant-id>
smplify tenant info
Start with a read-oriented command, then move into a controlled action once you can see the target set clearly.
smplify device list
smplify device search --os windows --status vulnerable --output json
smplify remediation list
smplify remediation run patch-critical --device dev-123
Once the basics are working, move into install policy for wider rollout, workflow guidance for shell and agent usage, and the reference page for command surface coverage.