Subcomponents of the asset that is exfiltrated - these could be
URIs used during exfiltration, table names, databases, filenames, etc.
For example, multiple tables may be exfiltrated from the same CloudSQL
instance, or multiple files from the same Cloud Storage bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["The latest version available for the `ExfilResource` class in the Google Cloud SecurityCenter V1 API is 3.24.0."],["This document provides reference material for the `ExfilResource` class, which represents a resource that has been exfiltrated or designated for exfiltration."],["The class implements several interfaces, including `IMessage`, `IEquatable`, `IDeepCloneable`, and `IBufferMessage`, offering methods for object comparison, cloning, and message handling."],["The `ExfilResource` class includes properties like `Components` (a list of subcomponents) and `Name` (the resource's URI)."],["There are numerous previous versions available for this resource ranging from 2.2.0 to 3.23.0, along with the latest version."]]],[]]