Subcomponents of the asset that was exfiltrated, like URIs used during
exfiltration, table names, databases, and filenames. For example, multiple
tables might have been exfiltrated from the same Cloud SQL instance, or
multiple files might have been exfiltrated from the same Cloud Storage
bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis webpage provides reference documentation for the \u003ccode\u003eExfilResource\u003c/code\u003e class within the Google Cloud Security Command Center v1 API, specifically for the .NET environment.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eExfilResource\u003c/code\u003e class represents a resource where data was either exfiltrated from or to, providing details on exfiltration activities.\u003c/p\u003e\n"],["\u003cp\u003eThe document outlines various versions of the API, ranging from 2.2.0 to the latest 3.24.0, including class details for version 3.20.0.\u003c/p\u003e\n"],["\u003cp\u003eKey class attributes are explained including \u003ccode\u003eComponents\u003c/code\u003e, a \u003ccode\u003eRepeatedField\u003c/code\u003e containing strings, and the \u003ccode\u003eName\u003c/code\u003e property representing the full resource name.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eExfilResource\u003c/code\u003e class implements multiple interfaces like \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e, and inherits from \u003ccode\u003eobject\u003c/code\u003e.\u003c/p\u003e\n"]]],[],null,[]]