In addition to blocking malicious activity by identifying & categorising DNS domains, include a feature to monitor/log/block DNS tunnelling and data exfiltration activity. For example, use Payload Analysis & Traffic analysis to identify these exploits.