Content Filtering Options for Secure Internet Go.

What is Secure Internet Go?

Secure Internet Go offers automatic protection against online threats with advanced content filtering and more—made easy—for T-Mobile users when on the T-Mobile network. It offers a choice of standard filter options that are continuously updated to protect against the latest threats, eliminating the need for custom configuration and IT support. It is ideal for small businesses with 5 to 24 employees. Learn more about Secure Internet Go with T-SIMsecure. For larger organizations, we offer T-Mobile SASE with Secure Internet Access and T-SIMsecure.

Content filtering options.

Secure Internet Go automatically filters out high risk and inappropriate sites as listed below. If desired, it can filter out sites that can hurt productivity, such as gaming and streaming.
The following sites are currently included in the respective filters.

Standard Filters

Optional Filter

Security/high risk.

  • Bot nets
  • Malware sites
  • Phishing and other fraud
  • Spam URLs
  • Spyware and adware


  • Abused drugs
  • Adult and pornography
  • Gambling
  • Gross
  • Hacking
  • Hate and racism
  • Illegal
  • Keyloggers and monitoring
  • Marijuana
  • Nudity
  • Peer to peer
  • Self-harm
  • Swimsuits & intimate apparel
  • Violence
  • Weapons


  • Amazon Video
  • Apple TV+
  • Call of Duty
  • Clash Royale
  • Crunchyroll
  • Direct TV
  • Disney Plus
  • Discovery Plus
  • Epic Games
  • FuboTV
  • Hulu
  • Minecraft
  • Mobile Legends
  • Netflix
  • Paramount+
  • Peacock TV
  • Philo TV
  • Playstation
  • Pokémon Go
  • PUBG
  • Sling TV
  • Stadia
  • Twitch
  • Vortex Gaming
  • Xbox

T-Mobile may add or remove sites in these categories over time to continue to address new and evolving concerns on behalf of its customers.

Sites that are primarily classified as social media are not filtered. 
For more information and alternatives, please call Customer Care at (800) 375-1126.

Content filtering policy details: security/high risk.

  • These are URLs, typically IP addresses, which are determined to be part of a bot network, from which network attacks are launched. Attacks may include spam messages, DOS, SQL injections, proxy jacking, and other unsolicited contacts.

  • Malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, and code.

  • Phishing, pharming, and other sites that pose as a reputable site, usually to harvest personal information from a user. These sites are typically quite short-lived, so examples don’t last long. Please contact us if you need fresh data.

  • URLs contained in spam.

  • Spyware or adware sites that provide or promote information gathering or tracking that is unknown to, or without the explicit consent of, the end user or the organization. Also includes unsolicited advertising popups and programs that may be installed on a user’s computer.

Content filtering policy details: inappropriate.

  • Discussion or remedies for illegal, illicit, or abused drugs such as heroin, cocaine, or other street drugs. Information on “legal highs:” glue sniffing, misuse of prescription drugs or abuse of other legal substances.

  • Sexually explicit material for the purpose of arousing a sexual or prurient interest. Adult products including sex toys, magazines, and videos. Online groups, including newsgroups and forums that are sexually explicit in nature. Erotic stories and textual descriptions of sexual acts. Adult services including videoconferencing, escort services, and strip clubs. Sexually explicit art.

  • Gambling or lottery web sites that invite the use of real or virtual money. Information or advice for placing wagers, participating in lotteries, gambling, or running numbers. Virtual casinos and offshore gambling ventures. Sports picks and betting pools. Virtual sports and fantasy leagues that offer large rewards or request significant wagers. Hotel and Resort sites that do not enable gambling on the site are categorized in Travel or Local Information.

  • Vomit and other bodily functions, bloody clothing, etc.

  • Illegal or questionable access to or the use of communications equipment/software. Development and distribution of programs that may allow compromise of networks and systems. Avoidance of licensing and fees for computer programs and other systems.

  • Sites that contain content and language in support of hate crimes and racism such as Nazi, neo-Nazi, Ku Klux Klan, etc.

  • Criminal activity, how not to get caught, copyright and intellectual property violations, etc.

  • Downloads and discussion of software agents that track a user’s keystrokes or monitor their web surfing habits.

  • Marijuana use, cultivation, history, culture, legal issues.

  • Nude or seminude depictions of the human body. These depictions are not necessarily sexual in intent or effect but may include sites containing nude paintings or photo galleries of artistic nature. This category also includes nudist or naturist sites that contain pictures of nude individuals.

  • Peer to peer clients and access. Includes torrents, music download programs.

  • Self-harm category, URLs promoting self-harm such as, anorexia, bulimia, and other types of self-harm are created for endpoint policy-enforcement.

  • Swimsuits, intimate apparel, or other types of suggestive clothing.

  • Sites that advocate violence, depictions, and methods, including game/comic violence and suicide.

  • Sales, reviews, or descriptions of weapons such as guns, knives, or martial arts devices, or provide information on their use, accessories, or other modifications.

Ready to secure your network?