Subcomponents of the asset that was exfiltrated, like URIs used during
exfiltration, table names, databases, and filenames. For example, multiple
tables might have been exfiltrated from the same Cloud SQL instance, or
multiple files might have been exfiltrated from the same Cloud Storage
bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["The `ExfilResource` class in the Security Command Center v2 API represents a resource where data was exfiltrated from or to, offering a way to track data exfiltration events."],["This class inherits from `object` and implements multiple interfaces, including `IMessage`, `IEquatable`, `IDeepCloneable`, and `IBufferMessage`, providing functionalities for message handling, comparison, deep cloning, and buffer management."],["The `ExfilResource` class has two constructors, a default one and another that accepts an `ExfilResource` object for creating a copy."],["It includes properties such as `Components`, which is a `RepeatedField` of strings representing subcomponents of the exfiltrated asset, and `Name`, a string representing the full resource name."]]],[]]