Subcomponents of the asset that is exfiltrated - these could be
URIs used during exfiltration, table names, databases, filenames, etc.
For example, multiple tables may be exfiltrated from the same CloudSQL
instance, or multiple files from the same Cloud Storage bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["The `ExfilResource` class in the Google Cloud Security Command Center v1 API represents a resource that has been exfiltrated or targeted for exfiltration, and it's implemented using multiple interfaces for detailed functionality, as shown by the list of interfaces it implements."],["The class offers multiple versions, ranging from 2.2.0 to the latest 3.24.0, indicating a history of updates and improvements, all documented and available."],["`ExfilResource` has properties such as `Components` and `Name`, allowing users to specify the subcomponents of the exfiltrated asset and its URI."],["There are two constructors for the class, one being a default constructor and another allowing you to make a copy of another `ExfilResource` class."],["The `ExfilResource` class inherits from the `Object` class, and several of its methods are inherited, including `GetHashCode()`, `GetType()`, `MemberwiseClone()`, and `ToString()`."]]],[]]