public sealed class Exfiltration : IMessage<Exfiltration>, IEquatable<Exfiltration>, IDeepCloneable<Exfiltration>, IBufferMessage, IMessage
Reference documentation and code samples for the Google Cloud Security Command Center v1 API class Exfiltration.
Exfiltration represents a data exfiltration attempt of one or more
sources to one or more targets. Sources represent the source
of data that is exfiltrated, and Targets represents the destination the
data was copied to.
public RepeatedField<ExfilResource> Sources { get; }
If there are multiple sources, then the data is considered "joined" between
them. For instance, BigQuery can join multiple tables, and each
table would be considered a source.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["This webpage provides reference documentation for the `Exfiltration` class within the Google Cloud Security Command Center v1 API, specifically under version 3.8.0."],["The `Exfiltration` class represents a data exfiltration attempt from one or more sources to one or more targets, detailing where the data originated and where it was copied."],["The page lists all previous versions of `Exfiltration` dating back to version 2.2.0 with version 3.24.0 being the latest version."],["The class implements interfaces like `IMessage`, `IEquatable`, `IDeepCloneable`, `IBufferMessage`, and `IMessage` and inherits members from `Object`, such as `GetHashCode`, `GetType`, `MemberwiseClone`, and `ToString`."],["Key properties of the `Exfiltration` class include `Sources` and `Targets`, both of which are `RepeatedField` collections of `ExfilResource`, indicating the multiple potential origins and destinations of the exfiltrated data."]]],[]]