Subcomponents of the asset that is exfiltrated - these could be
URIs used during exfiltration, table names, databases, filenames, etc.
For example, multiple tables may be exfiltrated from the same CloudSQL
instance, or multiple files from the same Cloud Storage bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["The webpage provides documentation for the `ExfilResource` class within the Google Cloud Security Command Center v1 API, with the latest version being 3.24.0."],["`ExfilResource` represents a resource that has been exfiltrated or has had data exfiltrated to it, and it implements multiple interfaces, including `IMessage`, `IEquatable`, `IDeepCloneable`, and `IBufferMessage`."],["The class has two constructors: a default constructor and one that takes another `ExfilResource` as a parameter, allowing for object duplication."],["Key properties of the class include `Components`, which is a `RepeatedField` of strings representing subcomponents of the exfiltrated asset, and `Name`, which stores the resource's URI."],["The webpage lists all available versions of the documentation of the class, from 2.2.0 up to 3.24.0, with the different version number having a corresponding documentation."]]],[]]