Subcomponents of the asset that was exfiltrated, like URIs used during
exfiltration, table names, databases, and filenames. For example, multiple
tables might have been exfiltrated from the same Cloud SQL instance, or
multiple files might have been exfiltrated from the same Cloud Storage
bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["The `ExfilResource` class in the Google Cloud Security Command Center v1 API represents a resource from which data was exfiltrated."],["The latest version of the `ExfilResource` documentation is version 3.24.0, with multiple earlier versions available for reference."],["`ExfilResource` inherits from `object` and implements interfaces like `IMessage`, `IEquatable`, `IDeepCloneable`, and `IBufferMessage`, providing functionalities for message handling, comparison, deep cloning, and buffered operations."],["Key properties of `ExfilResource` include `Components`, which details subcomponents of the exfiltrated asset, and `Name`, representing the full resource name of the exfiltrated resource."],["The class has two constructors, a default one, and another to create a new instance by copying another one."]]],[]]