Subcomponents of the asset that is exfiltrated - these could be
URIs used during exfiltration, table names, databases, filenames, etc.
For example, multiple tables may be exfiltrated from the same CloudSQL
instance, or multiple files from the same Cloud Storage bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["This webpage provides documentation for the `ExfilResource` class within the `Google.Cloud.SecurityCenter.V1` namespace, detailing its usage and properties."],["The `ExfilResource` class represents a resource that has been involved in data exfiltration, offering information about its components and URI."],["The latest documented version of `ExfilResource` is 3.24.0, with the page also listing documentation for past versions down to version 2.2.0."],["`ExfilResource` implements multiple interfaces such as `IMessage`, `IEquatable`, `IDeepCloneable`, and `IBufferMessage`, and inherits from the `Object` class."],["The class features two constructors, `ExfilResource()` and `ExfilResource(ExfilResource other)`, as well as properties like `Components`, representing subcomponents of the exfiltrated asset, and `Name` which corresponds to the resource's URI."]]],[]]