Subcomponents of the asset that was exfiltrated, like URIs used during
exfiltration, table names, databases, and filenames. For example, multiple
tables might have been exfiltrated from the same Cloud SQL instance, or
multiple files might have been exfiltrated from the same Cloud Storage
bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["This webpage provides reference documentation for the `ExfilResource` class within the Google Cloud Security Command Center v1 API, spanning multiple versions."],["`ExfilResource` represents a resource where data was either taken from or sent to and is used to identify the data during exfiltration in Security Command Center."],["The documentation covers versions from 2.2.0 up to the latest 3.24.0, including version 3.23.0 which is what the main documentation is based around."],["The class implements multiple interfaces, including `IMessage`, `IEquatable`, `IDeepCloneable`, and `IBufferMessage`, and also shows the inheritance from `object`."],["`ExfilResource` has properties such as `Components`, for listing the subcomponents involved in exfiltration, and `Name`, for specifying the full resource name."]]],[]]