Subcomponents of the asset that is exfiltrated - these could be
URIs used during exfiltration, table names, databases, filenames, etc.
For example, multiple tables may be exfiltrated from the same CloudSQL
instance, or multiple files from the same Cloud Storage bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-04-17 UTC."],[[["This webpage provides reference documentation for the `ExfilResource` class within the Google Cloud Security Center v1 API, detailing its implementation and inheritance."],["The `ExfilResource` class represents a resource that has been the target or the source of data exfiltration, serving as a data model in the API."],["The documentation lists various versions of the API, starting from version 2.2.0 up to the latest 3.24.0, each with its own specific `ExfilResource` documentation."],["`ExfilResource` has two main properties: `Components`, which is a collection of strings representing subcomponents of the exfiltrated asset, and `Name`, which stores the URI of the resource."],["The `ExfilResource` Class implements the following interfaces `IMessage`, `IEquatable`, `IDeepCloneable`, and `IBufferMessage`."]]],[]]