A processor may install an imposter security client (ISC) at an endpoint. The processor may install a subscription based imposter security service (ISS). The ISS may be part of an identity and access management (IAM) system. The processor may exchange information between the ISC and the ISS. The exchange may be automatically triggered when the ISS receives an imposter identification (ID) from the IAM system. The imposter ID may be associated with an unauthorized endpoint user. The processor may protect the endpoint from the unauthorized endpoint user.