Subcomponents of the asset that was exfiltrated, like URIs used during
exfiltration, table names, databases, and filenames. For example, multiple
tables might have been exfiltrated from the same Cloud SQL instance, or
multiple files might have been exfiltrated from the same Cloud Storage
bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["This webpage provides reference documentation for the `ExfilResource` class within the Google Cloud Security Center v1 API, specifically for .NET developers."],["The `ExfilResource` class represents a resource where data was exfiltrated from or to, and it implements interfaces like `IMessage`, `IEquatable`, `IDeepCloneable`, and `IBufferMessage`."],["The latest version documented is 3.24.0, with the current version of the page sitting at 3.14.0 and includes a comprehensive list of previous versions ranging back to 2.2.0."],["Key properties of the `ExfilResource` class include `Components`, a `RepeatedField` of strings representing subcomponents of the exfiltrated asset, and `Name`, the full resource name of the exfiltrated resource."],["The documentation details the class's inheritance, implementing interfaces, constructors, properties, and includes links to related documentation for .NET, object classes, and protobuf message types."]]],[]]