Subcomponents of the asset that was exfiltrated, like URIs used during
exfiltration, table names, databases, and filenames. For example, multiple
tables might have been exfiltrated from the same Cloud SQL instance, or
multiple files might have been exfiltrated from the same Cloud Storage
bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["The `ExfilResource` class in the Google Cloud Security Command Center v1 API represents a resource from or to which data was exfiltrated."],["This page provides documentation and code samples for the `ExfilResource` class across multiple versions, ranging from 2.2.0 to the latest 3.24.0."],["The `ExfilResource` class implements several interfaces, including `IMessage`, `IEquatable`, `IDeepCloneable`, and `IBufferMessage`."],["Key properties of `ExfilResource` include `Components`, which lists subcomponents of the exfiltrated asset, and `Name`, which represents the full resource name."],["The current page highlights all of the different versions of the `ExfilResource` Class, and details the inheritance of the class, as well as the constructors, the properties, and their values."]]],[]]