public sealed class Exfiltration : IMessage<Exfiltration>, IEquatable<Exfiltration>, IDeepCloneable<Exfiltration>, IBufferMessage, IMessage
Reference documentation and code samples for the Google Cloud Security Command Center v1 API class Exfiltration.
Exfiltration represents a data exfiltration attempt of one or more
sources to one or more targets. Sources represent the source
of data that is exfiltrated, and Targets represents the destination the
data was copied to.
public RepeatedField<ExfilResource> Sources { get; }
If there are multiple sources, then the data is considered "joined" between
them. For instance, BigQuery can join multiple tables, and each
table would be considered a source.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["This webpage provides documentation for the `Exfiltration` class within the Google Cloud Security Command Center v1 API, specifically for .NET development, detailing its structure, properties, and usage."],["The `Exfiltration` class represents an attempt to copy data from one or more sources to one or more targets, essentially detailing the process of potential data exfiltration."],["The webpage lists the different available versions of the Google.Cloud.SecurityCenter.V1 API from 2.2.0 to 3.24.0, with 3.24.0 being the latest and the content shown focusing on version 3.7.0."],["The class `Exfiltration` implements multiple interfaces including IMessage, IEquatable, IDeepCloneable, and IBufferMessage, providing methods for object management and comparison."],["The `Exfiltration` class includes properties for `Sources` and `Targets`, which are of type RepeatedField\u003cExfilResource\u003e and can indicate multiple origins and destinations of the exfiltrated data."]]],[]]