Cloud NGFW for Azure
Cloud NGFW for Azure Security Services
Table of Contents
                    
          Expand All
          |
          Collapse All
        
        Cloud NGFW for Azure Docs
Cloud NGFW for Azure Security Services
Learn about Cloud NGFW for Azure security services.
    
  | Where Can I Use This? | What Do I Need? | 
|---|---|
| 
 | 
 | 
Cloud NGFW uses your rulestack definitions to protect your Azure Virtual
            Network (VNet) traffic by a two-step process. First, it enforces your rules to allow or
            deny your traffic. Second, it performs content inspection on the allowed traffic (URLs,
            threats, files) based on what you specify on the Security Profiles. Additionally, it
            helps you define how Cloud NGFW should scan the allowed traffic and block threats such
            as malware, malware, spyware, and DDoS attacks.
    IPS and Spyware Threat Protection
- IPS Vulnerability—(enabled by default and preconfigured based on best practices) an intrusion prevention system (IPS) vulnerability profile stops attempts to exploit system flaws or gain unauthorized access to systems. While antispyware profiles help identify infected hosts as traffic leaves the network, IPS Vulnerability profiles protect against threats entering the network. For example, Vulnerability Protection profiles help protect against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities. The default Vulnerability Protection profile protects clients and servers from all known critical, high, and medium-severity threats.Best practice configurationThe following Vulnerability best practice configuration is enabled by default on Cloud NGFW for Azure.Signature Severity Action Critical Reset both High Reset both Medium Reset both Informational Default Low Default 
- Antispyware—(enabled by default and preconfigured based on best practices) an antispyware profile blocks spyware on compromised hosts from trying to phone-home or beacon out to external command and control (C2) servers, allowing you to detect malicious traffic leaving the network from infected clients.
Best practice configuration.
The following antispyware best practice configuration is enabled by default on Cloud
                NGFW for Azure.
  
    
| Signature Severity | Action | 
|---|---|
| Critical | Reset both | 
| High | Reset both | 
| Medium | Reset both | 
| Informational | Default | 
| Low | Default | 
IPS Vulnerability and antispyware signatures
The following table lists all possible signatures for the Vulnerability and spyware
                categories. These signatures are continuously updated on your NGFWs.
  | Threat Category | Description | 
|---|---|
| Vulnerability signatures | |
| Brute-force | A brute-force signature detects multiple occurrences of a
                                    condition in a particular time frame. While the activity in
                                    isolation might be benign, the brute-force signature indicates
                                    that the frequency and rate at which the activity occurred is
                                    suspect. For example, a single FTP login failure does not
                                    indicate malicious activity. However, many failed FTP logins in
                                    a short period likely indicate an attacker attempting password
                                    combinations to access an FTP server. | 
| code execution | Detects a code execution vulnerability that an attacker can
                                    leverage to run code on a system with the privileges of the
                                    logged-in user. | 
| code-obfuscation | Detects code that has been transformed to conceal certain data
                                    while retaining its function. Obfuscated code is difficult or
                                    impossible to read, so it's not apparent what commands the code
                                    is executing or with which programs it's designed to interact.
                                    Most commonly, malicious actors obfuscate code to conceal
                                    malware. More rarely, legitimate developers might obfuscate code
                                    to protect privacy, intellectual property, or to improve user
                                    experience. For example, certain types of obfuscation (like
                                    minification) reduce file size, which decreases website load
                                    times and bandwidth usage. | 
| DoS | Detects a denial-of-service attack, where an attacker attempts to
                                    render a targeted system unavailable, temporarily disrupting the
                                    system and dependent applications and services. To perform a DoS
                                    attack, an attacker might flood a targeted system with traffic
                                    or send information that causes it to fail. DoS attacks deprive
                                    legitimate users (like employees, members, and account holders)
                                    of the service or resource to which they expect access. | 
| exploit-kit | Detects an exploit kit landing page. Exploit kit landing pages
                                    often contain several exploits that target one or many Common
                                    Vulnerabilities and Exposures  (CVEs), for multiple browsers and
                                    plugins. Because the targeted CVEs change quickly, exploit-kit
                                    signatures trigger based on the exploit kit landing page, and
                                    not the CVEs. When a user visits a website with an exploit kit, the exploit kit
                                    scans for the targeted CVEs and attempts to silently deliver a
                                    malicious payload to the victim’s computer. | 
| info-leak | Detects a software vulnerability that an attacker could exploit
                                    to steal sensitive or proprietary information. Often, an
                                    info-leak might exist because comprehensive checks don’t exist
                                    to guard the data, and attackers can exploit info-leaks by
                                    sending crafted requests. | 
| insecure-credentials | Detects the use of weak, compromised, and manufacturer default
                                    passwords for software, network appliances, and IoT devices. | 
| Overflow | Detects an overflow vulnerability, where a lack of proper checks
                                    on requests could be exploited by an attacker. A successful
                                    attack could lead to remote code execution with the privileges
                                    of the application, server, or operating system. | 
| phishing | Detects when a user attempts to connect to a phishing kit landing
                                    page (likely after receiving an email with a link to the
                                    malicious site). A phishing website tricks users into submitting
                                    credentials that an attacker can steal to gain access to the
                                    network. | 
| protocol-anomaly | Detects protocol anomalies, where a protocol behavior deviates
                                    from standard and compliant usage. For example, a malformed
                                    packet, a poorly written application, or an application running
                                    on a nonstandard port would all be considered protocol
                                    anomalies, and could be used as evasion tools.  | 
| sql-injection | Detects a common hacking technique where an attacker inserts SQL
                                    queries into an application’s requests to read from or modify a
                                    database. This type of technique is often used on websites that
                                    don’t comprehensively sanitize user input. | 
| Spyware signatures | |
| Spyware | Detect outbound C2 communication. These signatures are either
                                    autogenerated or are manually created by Palo Alto Networks
                                    researchers. Spyware and autogen signatures both detect outbound C2
                                        communication; however, autogen signatures are payload-based
                                        and can uniquely detect C2 communications with C2 hosts that
                                        are unknown or change rapidly. | 
| adware | Detects programs that display potentially unwanted
                                    advertisements. Some adware modifies browsers to highlight and
                                    hyperlink the most frequently searched keywords on web
                                    pages-these links redirect users to advertising websites. Adware
                                    can also retrieve updates from a command and control (C2) server
                                    and install those updates in a browser or onto a client
                                    system. | 
| autogen | These payload-based signatures detect command and control (C2)
                                    traffic and are autogenerated. Importantly, autogen signatures
                                    can detect C2 traffic even when the C2 host is unknown or
                                    changes rapidly. | 
| Backdoor | Detects a program that allows an attacker to gain unauthorized
                                    remote access to a system. | 
| Botnet | Indicates botnet activity. A botnet is a network of
                                    malware-infected computers (“bots”) that an attacker
                                    controls. The attacker can centrally command every computer in a
                                    botnet to simultaneously carry out a coordinated action (like
                                    launching a DoS attack, for example). | 
| browser-hijack | Detects a plugin or software that’s modifying browser settings. A
                                    browser hijacker might take over auto search or track users’ web
                                    activity and send this information to a C2 server. | 
| cryptominer | (Sometimes known as cryptojacking or miners) Detects the download
                                    attempt or network traffic generated from malicious programs
                                    designed to use computing resources to mine cryptocurrencies
                                    without the user's knowledge. Cryptominer binaries are
                                    frequently delivered by a shell script downloader that attempts
                                    to determine system architecture and kill other miner processes
                                    on the system. Some miners execute within other processes, such
                                    as a web browser rendering a malicious webpage.  | 
| data-theft | Detects a system sending information to a known C2 server. | 
| DNS | Detects DNS requests to connect to malicious domains. | 
| downloader | (Also known as droppers, stagers, or loaders) Detects programs
                                    that use an internet connection to connect to a remote server to
                                    download and execute malware on the compromised system. The most
                                    common use case is to deploy a downloader as the culmination of
                                        stage one of a cyberattack, where the downloader’s
                                    fetched payload execution is the second stage. Shell
                                    scripts (Bash, PowerShell, etc.), Trojans, and malicious lure
                                    documents (also known as mallocs) such as PDFs and Word files
                                    are common downloader types. | 
| fraud | (Including formjacking, phishing, and scams) Detects access to
                                    compromised websites that have been injected with malicious
                                    JavaScript code to collect sensitive user information. (For
                                    example, Name, address, email, credit card number, CVV,
                                    expiration date) from payment forms that are captured on the
                                    checkout pages of e-commerce websites. | 
| hack tool | Detects traffic generated by software tools used by malicious
                                    actors to conduct reconnaissance, attack or gain access to
                                    vulnerable systems, exfiltrate data, or create a command and
                                    control channel to surreptitiously control a computer system
                                    without authorization. These programs are associated with
                                    malware and cyberattacks. Hacking tools might be deployed in a
                                    benign manner when used in Red and Blue Team operations,
                                    penetration tests, and R&D. The use or possession of these
                                    tools may be illegal in some countries, regardless of
                                    intent. | 
| networm | Detects a program that self-replicates and spreads from system to
                                    system. Net-worms might use shared resources or leverage
                                    security failures to access target systems. | 
| phishing-kit | Detects when a user attempts to connect to a phishing kit landing
                                    page (likely after receiving an email with a link to the
                                    malicious site). A phishing website tricks users into submitting
                                    credentials that an attacker can steal to gain access to the
                                    network. | 
| post-exploitation | Detects activity that indicates the post-exploitation phase of an
                                    attack, where an attacker attempts to assess the value of a
                                    compromised system. This might include evaluating the
                                    sensitivity of the data stored on the system, and the system’s
                                    usefulness in further compromising the network. | 
| Webshell | Detects web shells and web shell traffic, including implant
                                    detection and command and control interaction. Web shells must
                                    first be implanted by a malicious actor onto the compromised
                                    host, most often targeting a web server or framework. Subsequent
                                    communication with the web shell file frequently enables a
                                    malicious actor to establish a foothold in the system, conduct
                                    service and network enumeration, data exfiltration, and remote
                                    code execution in the context of the web server user. The most
                                    common web shell types are PHP, .NET, and Perl markup scripts.
                                    Attackers can also use web shell-infected web servers (the web
                                    servers can be both internet-facing or internal systems) to
                                    target other internal systems. | 
| Keylogger | Detects programs that allow attackers to secretly track user
                                    activity, by logging keystrokes and capturing screenshots. Keyloggers use various C2 methods to periodically send logs and
                                    reports to a predefined e-mail address or a C2 server. Through
                                    keylogger surveillance, an attacker could retrieve credentials
                                    that would enable network access. | 
Malware and File-based Threat Protection
- Antivirus—(enabled by default and preconfigured based on best practices) antivirus profiles protect against malware, worms, and Trojans as well as spyware downloads. Using a stream-based malware prevention engine, which inspects traffic the moment the first packet is received, the Palo Alto Networks antivirus solution can provide protection for clients without significantly impacting the performance of the firewall. This profile scans for a wide variety of malware in executables, PDF files, HTML and JavaScript malware, including support for scanning inside compressed files and data encoding schemes.Best practice configurationThe following Antivirus best practice configuration is enabled by default on Cloud NGFW for Azure.Protocol Action FTP Reset both HTTP Reset both HTTP2 Reset both IMAP Reset both POP3 Alert SMB Reset both SMTP Reset both 
- File blocking—(enabled by default and preconfigured based on best practices) file blocking profiles allows you to identify specific file types that you want to block or monitor. The firewall uses file blocking profiles to block specific file types over specified applications and in the specified session flow direction (inbound/outbound/both). You can set the profile to alert or block on upload and/or download and you can specify which applications will be subject to the file blocking profile.- Alert—when the specified file type is detected, a log is generated in the data filtering log.
- Block—when the specified file type is detected, the file is blocked. A log is also generated in the data filtering log.
 
Best practice configuration.
The following file blocking best practice configuration is enabled by default on
                Cloud NGFW for Azure.
  
    
| File Types | Application | Direction | Action | 
|---|---|---|---|
| All risky file types: 
 | Any | Both (upload and download) | Block | 
| All remaining file types | Any | Both (upload and download) | Alert | 
Antivirus signatures
The following table lists all possible signatures for the Antivirus category. These
                signatures are continuously updated on your NGFWs.
  | Threat Category | Description | 
|---|---|
| Antivirus signatures | |
| apk | Malicious Android Application (APK) files. | 
| Mac OS X | Malicious Mac OS X files, including: 
 | 
| flash | Adobe Flash applets and Flash content embedded in webpages.  | 
| jar | Java applets (JAR/class file types). | 
| ms-office | Microsoft Office files, including documents (DOC, DOCX, RTF),
                                    workbooks (XLS, XLSX), and PowerPoint presentations (PPT, PPTX).
                                    This also includes Office Open XML (OOXML) 2007+ documents. | 
| pdf | Portable Document Format (PDF) files. | 
| pe | Portable Executable (PE) files can automatically execute on a
                                    Microsoft Windows system and should only be allowed when
                                    authorized. These files types include: 
 | 
| linux | Executable and Linkable Format (ELF) files. | 
| archive | Roshal Archive (RAR) and 7-Zip (7z) archive files. | 
Web-based Threat Protection
URL categories and Filtering—(enabled by default and preconfigured based on
                    best practices) URL Filtering profiles
                enable you to monitor and control how users access the web over HTTP and HTTPS. The
                firewall comes with a default profile that is configured to block websites such as
                known malware sites, phishing sites, and adult content sites. URL Filtering profile
                isn’t enabled by default. When you enable URL Filtering profile in your rulestack,
                Cloud NGFW enforces the best practices URL Filtering profile on your traffic. You
                have an option to modify the default access option on each of the categories, based
                on your needs.
Best practices configuration
By default, URL Filtering is enabled and uses a Security policy based on best
                    practices.
  
    
| URL Categories | Site Access | Credential Submissions | 
|---|---|---|
| Malicious and exploitative categories: 
 | Block | Block | 
| All other URL categories | Alert | Alert | 
Predefined URL categories for Cloud NGFW for Azure
The following table describes the predefined URL categories available on
                Cloud NGFW on Azure. You can use these categories in security rules to block or
                allows access to websites that fall into them.
  | URL Category | Description | 
|---|---|
| Risk Categories | |
| High Risk | Sites that were previously confirmed to be malicious but have
                                    displayed benign activity for at least 30 days. Sites hosted on
                                    bulletproof ISPs or using an IP from an ASN that has known
                                    malicious content. Sites sharing a domain with a known malicious
                                    site. All sites in the “Unknown” category will be high risk. | 
| Medium Risk | Sites confirmed to be malicious but have displayed benign
                                    activity for at least 60 days. All sites in the “Online Storage
                                    and Backup” category will be a medium risk by default. | 
| Low Risk | Any site that isn’t High Risk or medium risk. This includes sites
                                    that were previously confirmed as malicious but have displayed
                                    benign activity for at least 90 days. | 
| Threat Categories | |
| Command-and-control  | Command-and-control URLs and domains used by malware and/or
                                    compromised systems to surreptitiously communicate with an
                                    attacker's remote server to receive malicious commands or
                                    exfiltrate data. | 
| Malware | Sites known to host malware or used for command and control (C2)
                                    traffic. May also exhibit Exploit Kits. | 
| Threat Adjacent Categories | |
| Dynamic DNS | Hosts and domain names for systems with dynamically assigned IP
                                    addresses and which are oftentimes used to deliver malware
                                    payloads or C2 traffic. Also, dynamic DNS domains don’t go
                                    through the same vetting process as domains that are registered
                                    by a reputable domain registration company, and are therefore
                                    less trustworthy. | 
| Grayware | Web content that does not pose a direct security threat but that
                                    displays other obtrusive behavior and tempt the end user to
                                    grant remote access or perform other unauthorized actions.
                                    Grayware includes illegal activities, criminal activities, rogue
                                    ware, adware, and other unwanted or unsolicited applications,
                                    such as embedded crypto miners, clickjacking, or hijackers that
                                    change the elements of the browser. Typosquatting domains that
                                    don’t exhibit maliciousness and are not owned by the targeted
                                    domain are categorized as grayware. | 
| Hacking | Sites relating to the illegal or questionable access to or the
                                    use of communications equipment or software. Development and
                                    distribution of programs, how-to-advice and/or tips that may
                                    result in the compromise of networks and systems. Also includes
                                    sites that facilitate the bypass of licensing and digital rights
                                    systems. | 
| Phishing | Web content that covertly attempts to fool the user to harvest
                                    information, including login credentials, credit card
                                    information–voluntarily or involuntarily, account numbers, PINs,
                                    and any information considered to be personally identifiable
                                    information (PII) from victims via social engineering
                                    techniques. Technical scam and scareware are also included as
                                    phishing. | 
| Suspicious | |
| Insufficient Content | Websites and services that present test pages, no content,
                                    provide API access not intended for end-user display or require
                                    authentication without displaying any other content suggesting a
                                    different categorization. Should not include websites providing
                                    remote access, such as web-based VPN solutions, web-based email
                                    services or identified credential phishing pages. | 
| Newly Registered Domain | Newly registered domains are often generated purposely or by
                                    domain generation algorithms and used for malicious
                                    activity. | 
| Parked | Domains registered by individuals are oftentimes later found to
                                    be used for credential phishing. These domains are similar to
                                    legitimate domains, for example, pal0alto0netw0rks.com, with the
                                    intent of phishing for credentials or personal identifying
                                    information. Or, they are domains that individual purchases
                                    rights  to in hopes that it may be valuable someday, such as
                                    panw.net. | 
| Proxy Avoidance and Anonymizers | URLs and services are often used to bypass content filtering
                                    products. | 
| Unknown | Sites that have not yet been identified by Palo Alto Networks. If
                                    availability is critical to your business and you must allow the
                                    traffic, alert on unknown sites, apply the best practice
                                    Security Profiles to the traffic, and investigate the
                                    alerts. | 
| Legal/Policy | |
| Abortion | Sites that pertain to information or groups in favor of or
                                    against abortion, detail  regarding abortion procedures, help or
                                    support forums for or against abortion, or sites that provide
                                    information regarding the consequences or effects of pursuing
                                    (or not) an abortion. | 
| Abused Drugs | Sites that promote the abuse of both legal and illegal drugs, use
                                    and sale of drug-related paraphernalia, manufacturing and/or
                                    selling of drugs. | 
| Adult | Sexually explicit material, media (including language), art,
                                    and/or products, online groups or forums that are sexually
                                    explicit in nature. Sites that promote adult services such as
                                    video or telephone conferencing, escort services, strip clubs,
                                    etc. Anything containing adult content (even if its games or
                                    comics) are categorized as adult. | 
| Alcohol and Tobacco | Sites that pertain to the sale, manufacturing, or use of alcohol
                                    and/or tobacco products and related paraphernalia. This includes
                                    sites related to electronic cigarettes. | 
| Auctions | Sites that promote the sale of goods between individuals. | 
| Business and Economy | Marketing, management, economics, and sites relating to
                                    entrepreneurship or running a business. This includes
                                    advertising and marketing firms. Should not include corporate
                                    websites as they are categorized with their technology. Also
                                    shipping sites, such as fedex.com and ups.com. | 
| Computer and internet Info | General information regarding computers and the internet. Should
                                    include sites about computer science, engineering, hardware,
                                    software, security, programming, etc. Programming has some
                                    overlap with reference, but the main category should remain
                                    computer and internet info. | 
| Content delivery networks  | Sites whose primary focus is delivering content to 3rd parties
                                    such as advertisements, media, files, and includes image
                                    servers. | 
| © Infringement | Domains with illegal content, such as content that allows illegal
                                    download of software or other intellectual property, which poses
                                    a potential liability risk. This category enables adherence to
                                    child protection laws required in the education industry as well
                                    as laws in countries that require internet providers to prevent
                                    users from sharing copyrighted material through their
                                    service. | 
| Cryptocurrency | Websites that promote cryptocurrencies, cryptomining websites (but not embedded crypto miners), cryptocurrency exchanges and vendors, and websites that manage cryptocurrency wallets and ledgers. This category does not include traditional financial services websites that reference cryptocurrencies, websites that explain and describe how cryptocurrencies and blockchains work, or websites that contain embedded cryptocurrency miners (grayware). | 
| Dating | Websites offering online dating services, advice, and other
                                    personal ads. | 
| Educational Institutions | Official websites for schools, colleges, universities, school
                                    districts, online classes, and other academic institutions.
                                    These refer to larger, established educational institutions such
                                    as elementary schools, high schools, universities, etc. Tutoring
                                    academies can go here as well. | 
| Entertainment and Arts | Sites for movies, television, radio, videos, programming guides
                                    or tools, comics, performing arts, museums, art galleries, or
                                    libraries. Includes sites for entertainment, celebrity, and
                                    industry news. | 
| Extremism | Websites promoting terrorism, racism, fascism, or other extremist
                                    views discriminating against people or groups of different
                                    ethnic backgrounds, religions, or other beliefs. This category
                                    was introduced to enable adherence to child protection laws
                                    required in the education industry. In some regions, laws and
                                    regulations may prohibit allowing access to extremist sites, and
                                    allowing access may pose a liability risk. | 
| Financial Services | Websites pertaining to personal financial information or advice,
                                    such as online banking, loans, mortgages, debt management,
                                    credit card companies, and insurance companies. Does not include
                                    sites relating to stock markets, brokerages, or trading
                                    services. Includes sites for foreign currency exchange. Includes
                                    sites for foreign currency exchange. | 
| Gambling | Lottery or gambling websites that facilitate the exchange of real
                                    and/or virtual money. Related websites that provide information,
                                    tutorials or advice regarding gambling, including betting odds
                                    and pools. Corporate websites for hotels and casinos that don’t
                                    enable gambling are categorized under Travel. | 
| Games | Sites that provide online play or download of video and/or
                                    computer games, game reviews, tips, or cheats, as well as
                                    instructional sites for nonelectronic games, sale or trade of
                                    board games, or related publications or media. Includes sites
                                    that support or host online sweepstakes and/or giveaways. | 
| Government | Official websites for local, state, and national governments, as
                                    well as related agencies, services, or laws. | 
| Health and Medicine | Sites containing information regarding general health
                                    information, issues, and traditional and nontraditional tips,
                                    remedies, and treatments. Also includes sites for various
                                    medical specialties, practices, and facilities (such as gyms and
                                    fitness clubs) as well as professionals. Sites relating to
                                    medical insurance and cosmetic surgery are also included. | 
| Home and Garden | Information, products, and services regarding home repair and
                                    maintenance, architecture, design, construction, decor, and
                                    gardening. | 
| Hunting and Fishing | Hunting and fishing tips, instructions, sale of related equipment
                                    and paraphernalia. | 
| Internet Communications and Telephony | Sites that support or provide services for video chatting,
                                    instant messaging, or telephony capabilities. | 
| Internet Portals | Sites that serve as a starting point for users, usually by
                                    aggregating a broad set of content and topics. | 
| Job Search | Sites that provide job listings and employer reviews, interview
                                    advice and tips, or related services for both employers and
                                    prospective candidates. | 
| Legal | Information, analysis or advice regarding the law, legal
                                    services, legal firms, or other legal related issues | 
| Military | Information or commentary regarding military branches,
                                    recruitment, current or past operations, or any related
                                    paraphernalia. | 
| Motor Vehicles | Information relating to reviews, sales and trading,
                                    modifications, parts, and other related discussions for
                                    automobiles, motorcycles, boats, trucks, and RVs. | 
| Music | Music sales, distribution, or information. Includes websites for
                                    music artists, groups, labels, events, lyrics, and other
                                    information regarding the music business. Does not include
                                    streaming music. | 
| News | Online publications, newswire services, and other websites that
                                    aggregate current events, weather, or other contemporary issues.
                                    Includes newspapers, radio stations, magazines, and
                                    podcasts. | 
| Not-Resolved | Indicates that the website wasn’t found in the local URL
                                    filtering database and the firewall was unable to connect to the
                                    cloud database to check the category. When a URL category lookup
                                    is performed, the firewall first checks the dataplane cache for
                                    the URL, if no match is found, it will then check the management
                                    plane cache, and if no match is found there, it queries the URL
                                    database in the cloud. When deciding on what action to take for
                                    traffic that is categorized as not-resolved, be aware that
                                    setting the action to block may be very disruptive to users. | 
| Nudity | Sites that contain nude or seminude depictions of the human body,
                                    regardless of context or intent, such as artwork. Includes
                                    nudist or naturist sites containing images of participants. | 
| Online Storage and Backup | Websites that provide online storage of files for free and as a
                                    service. | 
| Peer-to-peer | Sites that provide access to or clients for peer-to-peer sharing
                                    of torrents, download programs, media files, or other software
                                    applications. This is primarily for those sites that provide
                                    BitTorrent download capabilities. Does not include shareware or
                                    freeware sites. | 
| Personal Sites and Blogs | Personal websites and blogs by individuals or groups. Should try
                                    to first categorize based on content. For example, if someone
                                    has a blog just about cars, then the site should be categorized
                                    under "motor vehicles". However, if the site is a pure blog,
                                    then it should remain under "personal sites and blogs". | 
| Philosophy and Political Advocacy  | Sites containing information, viewpoints, or campaigns regarding
                                    philosophical or political views. | 
| Private IP addresses  | This category includes IP addresses defined in RFC 1918, 'Address
                                    Allocation for Private Intranets? It also includes domains not
                                    registered with the public DNS system (*.local and *.onion). | 
| Questionable | Websites containing tasteless humor, offensive content targeting
                                    specific demographics of individuals or groups of people. | 
| Real Estate | Information on property rentals, sales, and related tips or
                                    information. Includes sites for real estate agents, firms,
                                    rental services, listings (and aggregates), and property
                                    improvement. | 
| Recreation and Hobbies | Information, forums, associations, groups, and publications on
                                    recreations and hobbies. | 
| Reference and Research | Personal, professional, or academic reference portals, materials,
                                    or services. Includes online dictionaries, maps, almanacs,
                                    census information, libraries, genealogy, and scientific
                                    information. | 
| Religion | Information regarding various religions, related activities, or
                                    events. Includes websites for religious organizations,
                                    officials, and  places of worship. Includes sites for fortune
                                    telling. | 
| Search Engines | Sites that provide a search interface using keywords, phrases, or
                                    other parameters that may return information, websites, images,
                                    or  files as results. | 
| Sex Education | Information on reproduction, sexual development, safe sex
                                    practices, sexually transmitted diseases, birth control, tips
                                    for better sex, as well as any related products or related
                                    paraphernalia. Includes websites for related groups, forums, or
                                    organizations. | 
| Shareware and Freeware  | Sites that provide access to software, screensavers, icons,
                                    wallpapers, utilities, ringtones, themes, or widgets for free
                                    and/or donations. Also includes open-source projects. | 
| Shopping | Sites that facilitate the purchase of goods and services.
                                    Includes online merchants, websites for department stores,
                                    retail stores, catalogs, as well as sites that aggregate and
                                    monitor prices. Sites listed here should be online merchants
                                    that sell a variety of items (or whose main purpose is online
                                    sales). A webpage for a cosmetics company that also happens to
                                    allow online purchasing should be categorized with cosmetics and
                                    not shopping. | 
| Social Networking | User communities and sites where users interact with each other,
                                    post messages, pictures, or otherwise communicate with groups of
                                    people. Does not include blogs or personal sites. | 
| Society | Topics relating to the general population, issues that impact a
                                    large variety of people, such as fashion, beauty, philanthropic
                                    groups, societies, or children. Also includes restaurant
                                    websites.Includes websites designed for children as well as
                                    restaurants. | 
| Sports | Information about sporting events, athletes, coaches, officials,
                                    teams or organizations, sports scores, schedules and related
                                    news, and any related paraphernalia. Includes websites regarding
                                    fantasy sports and other virtual sports leagues. | 
| Stock Advice and Tools  | Information regarding the stock market, trading of stocks or
                                    options, portfolio management, investment strategies, quotes, or
                                    related news. | 
| Streaming Media | Sites that stream audio or video content for free and/or
                                    purchase. Includes online radio stations and other streaming
                                    music services. | 
| Swimsuits and Intimate Apparel | Sites that include information or images concerning swimsuits,
                                    intimate apparel, or other suggestive clothing | 
| Training and Tools | Sites that provide online education and training and related
                                    materials. Can include driving or traffic schools, workplace
                                    training, etc. | 
| Translation | Sites that provide translation services, including both user
                                    input and URL translations. These sites can also allow users to
                                    circumvent filtering as the target page's content is presented
                                    within the context of the translator's URL. | 
| Travel | Information regarding travel tips, deals, pricing information,
                                    destination information, tourism, and related services. Includes
                                    websites for hotels, local attractions, casinos, airlines,
                                    cruise lines, travel agencies, vehicle rentals, and sites that
                                    provide booking tools such as price monitors. Includes websites
                                    for local points of interest or tourist attractions such as the
                                    Eiffel Tower, the Grand Canyon, etc. | 
| Weapons | Sales, reviews, descriptions of or instructions regarding weapons
                                    and their use. | 
| Web Advertisements | Advertisements, media, content, and banners. | 
| Web Hosting | Free or paid for hosting services for webpages, including
                                    information regarding web development, publication, promotion,
                                    and other methods to increase traffic. | 
| Web-based Email | Any website that provides access to an email inbox and the
                                    ability to send and receive emails. | 
