Open Source · Apache 2.0 · Community and Pro editions

Identity Security Collector
Built for repeatable audits

ETC Collector is the evidence engine behind EtcSec’s Active Directory and Microsoft Entra ID reviews. It is a Go-based collector that supports standalone local operation, SaaS-enrolled daemon mode, REST API access, and recurring execution without requiring agents on domain controllers.

The published documentation positions it as a collection → parsing → analysis → graph → response pipeline, with support for LDAP or LDAPS, SMB for SYSVOL and GPO analysis, Microsoft Graph API, optional network probes, and structured JSON output.

Get Pro install commandserver
curl -fsSL https://get.etcsec.com/install-pro.sh | sudo bash -s -- --mode server --token="<verify-in-popup>"

Verify your email in the popup, then copy a one-line server install command with a short-lived token.

View on GitHub

Community Edition: Apache 2.0 open-source license, free for any use including commercial. Pro Edition: proprietary, included with EtcSec subscription.

Community: 277 AD + 148 Entra detectionsPro / Full: 277 AD + 158 Entra detectionsStandalone API or SaaS daemon modeRead-only by design
Core Capabilities

Why the collector is more than a small audit binary

Read-only collection across AD and Entra

LDAP or LDAPS, SMB for SYSVOL, and Microsoft Graph reads are combined in one workflow. No directory mutation is required to collect the evidence.

  • Users, groups, computers, GPOs, trusts, ACLs, ADCS
  • Applications, service principals, CA policies, privileged roles
  • Optional network probes are explicit opt-in controls

Modular detection engine

The architecture documentation describes a pluggable provider and detector system with concurrent execution and attack-graph analysis on top of collected objects.

  • Parallel detector execution
  • Structured JSON output
  • Attack graph support in Pro workflows

Productive local operation

Standalone server mode exposes a local web GUI and REST API on port 8443 so the collector can be used even without a SaaS connection.

  • Local GUI with dashboard and jobs view
  • REST API under /api/v1
  • JWT generation for automation via the GUI token

A collector that also scales into a managed fleet

Daemon mode polls the SaaS platform, executes commands, reports health, and can update itself while still keeping collection local to the customer environment.

  • Polling loop every 30 seconds by default
  • Encrypted local credential storage after enrollment
  • Designed for one collector per site or domain
Quick Start

Two operating modes, one collection engine

Use standalone server mode when everything must stay local, or enroll the daemon when you want the SaaS platform to orchestrate and track the collector.

Open the install command popup

Enter your email, verify the six-digit code, and copy a one-line server install command with a short-lived token.

Configure data sources

Point the collector at LDAP or LDAPS, SYSVOL, and optionally Microsoft Graph. SaaS daemon mode can also receive configuration pushes from the platform.

Run server or daemon mode

Standalone server mode starts the local GUI and API. Daemon mode enrolls into the SaaS platform and polls for commands while keeping collection local.

Security Model

The collector is designed to be explainable under review

Read-only inputs

The published docs describe LDAP or LDAPS and SMB reads for AD, plus Graph reads for Entra. The collector is not meant to write back into those systems during normal audit operation.

  • No agent install on domain controllers
  • No GPO or directory mutation
  • Network probes stay opt-in

Local-first exposure controls

Standalone mode runs a local API and GUI. In daemon mode the local GUI is bound to 127.0.0.1 by default unless the operator explicitly enables network exposure.

  • Standalone GUI and API on :8443
  • Daemon GUI disabled on network interfaces by default
  • JWT automation requires the GUI token workflow

Credential handling and fleet operation

Enrollment stores credentials locally in encrypted form. The docs also describe binary update staging and watcher restart logic for daemon mode.

  • Enrollment token not stored in plaintext
  • Best-effort unenroll path
  • Automatic binary update flow with checksum validation
Operating Flow

How ETC Collector runs in real environments

01

Standalone server mode

Run `etc-collector server` to expose the local GUI and REST API. This mode is useful for local review, air-gapped workflows, and API-driven one-off assessments.

02

Daemon mode for managed collectors

Run `etc-collector daemon` after enrollment to poll the SaaS platform for commands, execute audits locally, and report results and health back centrally.

03

API and automation

The local API under `/api/v1` supports JWT creation and programmatic audit launches, which makes the collector usable from scripts, SIEM hooks, and CI pipelines.

04

Central follow-up through EtcSec

The collector stays local to the environment, while EtcSec provides the dashboarding, scheduling, and historical follow-up layer for organisations that want it.

API and providers

Coverage and interfaces exposed by the collector

Detection providers

AD

Active Directory

Active · 277 detections · Community and Pro / Full
ENT

Microsoft Entra ID

Active · 158 detections · Community and Pro / Full

Operating modes

API

Standalone API

Active

Run ETC Collector locally with the embedded web GUI and REST API under `/api/v1`, without depending on the SaaS layer.

SaaS

SaaS daemon

Active

Enroll the collector into EtcSec to poll for commands, execute audits locally, and report health and results centrally.

Product Detail

How ETC Collector runs, integrates, and scales

Review the documented architecture, deployment modes, API surface, and the split between Community collection and the broader EtcSec operating layer.

Modes

Standalone server mode versus SaaS daemon mode

Standalone mode is useful when everything must stay local or when the security team wants to script around the local API directly. Daemon mode is useful when a central team wants to orchestrate collectors across multiple sites or domains without giving up local collection.

Importantly, the modes share the same collection engine. The distinction is how the collector is operated and where the workflow is observed, not whether one mode has a different evidence base.

Deployment model comparison
ModeWhat it doesBest fit
Standalone serverRuns a local GUI and REST API on port 8443 without SaaS dependencyAir-gapped, local-only, or API-driven one-off reviews
SaaS daemonPolls the SaaS platform for commands, executes locally, reports results and health centrallyManaged fleets, recurring audits, multi-site operation
Architecture

The published architecture is collection, parsing, analysis, graph, response

Language
Go 1.24+
Protocols
LDAP or LDAPS, SMB, Microsoft Graph API, optional DNS and HTTP probes
Outputs
JSON by default, with HTML and CSV support in the project docs
Deployment targets
CLI binary, Docker container, Windows service, API server

The published architecture describes a modular provider and detector model with concurrent execution. In practice, that means one engine can collect from AD and Entra ID, analyse results in parallel, and add graph context on top of collected objects.

Teams can see which protocols are used, which objects are collected, and how findings are derived. That makes the collector easier to review, approve, and operate in controlled environments.

Coverage

What the collector actually gathers and why it matters

Because the collector combines directory data, SYSVOL analysis, Graph data, and optional network probes, it can surface both identity misconfiguration and the surrounding controls that make compromise practical.

Published evidence sources
SourceExamplesWhy it matters
Active Directory via LDAPUsers, groups, computers, trusts, domains, ACLsCore identity and privilege relationships
SYSVOL via SMBregistry.pol, GptTmpl.inf, scriptsGPO hardening and credential leakage visibility
Microsoft Graph APIUsers, groups, applications, CA policies, role assignmentsCloud identity and policy posture
Optional probesSpooler, TLS, DNS or web enrollment surfacesRelay and weak transport detection
Community versus Pro

Where the Community edition stops and where richer workflows begin

The split is straightforward: Community gives you the collection engine and core detections, while Pro and EtcSec add dashboards, central orchestration, historical follow-up, and expanded analysis.

Published product split
CapabilityCommunityPro / EtcSec
Active Directory detectionsYesYes
Microsoft Entra ID detectionsYesYes
Standalone local server modeYesYes
SaaS daemon managementWorks with EtcSecYes
ADCS ESC analysisExtended in Pro workflowsYes
Attack-path graphingExtended in Pro workflowsYes
Dashboards, history, schedulingNoYes
Automation

Why the API surface and daemon flow matter in practice

The standalone server exposes `/api/v1` and supports JWT creation through the GUI token flow. That makes the collector usable from scripts, CI pipelines, or SIEM integrations. The daemon flow adds health reporting, remote commands, and update handling for teams managing multiple collectors.

That makes the collector practical for recurring reviews, scripted workflows, and local-first operations without giving up control over collection.

Where EtcSec adds more than the collector alone

The collector is the evidence engine. EtcSec adds dashboards, historical trending, scheduling, and a wider operating layer for teams that need central follow-up rather than local execution only.

Get started with EtcSec
  • Historical tracking and trend review
  • Multi-site orchestration
  • Recurring audit scheduling
  • Dashboard and remediation workflow
  • Cross-team visibility beyond local JSON output
  • A central layer around the same collection engine

Explore the collector before you decide how far to operationalise it

Start with the open-source collector if you need local evidence gathering. Add EtcSec when the same collection engine also needs a dashboard, scheduling, and central remediation follow-up.

View Documentation
ETC Collector | Open-Source Identity Security Collector | EtcSec