Subcomponents of the asset that is exfiltrated - these could be
URIs used during exfiltration, table names, databases, filenames, etc.
For example, multiple tables may be exfiltrated from the same CloudSQL
instance, or multiple files from the same Cloud Storage bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis webpage provides documentation for the \u003ccode\u003eExfilResource\u003c/code\u003e class within the \u003ccode\u003eGoogle.Cloud.SecurityCenter.V1\u003c/code\u003e namespace, detailing its usage and properties.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eExfilResource\u003c/code\u003e class represents a resource that has been involved in data exfiltration, offering information about its components and URI.\u003c/p\u003e\n"],["\u003cp\u003eThe latest documented version of \u003ccode\u003eExfilResource\u003c/code\u003e is 3.24.0, with the page also listing documentation for past versions down to version 2.2.0.\u003c/p\u003e\n"],["\u003cp\u003e\u003ccode\u003eExfilResource\u003c/code\u003e implements multiple interfaces such as \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e, and inherits from the \u003ccode\u003eObject\u003c/code\u003e class.\u003c/p\u003e\n"],["\u003cp\u003eThe class features two constructors, \u003ccode\u003eExfilResource()\u003c/code\u003e and \u003ccode\u003eExfilResource(ExfilResource other)\u003c/code\u003e, as well as properties like \u003ccode\u003eComponents\u003c/code\u003e, representing subcomponents of the exfiltrated asset, and \u003ccode\u003eName\u003c/code\u003e which corresponds to the resource's URI.\u003c/p\u003e\n"]]],[],null,[]]