Subcomponents of the asset that is exfiltrated - these could be
URIs used during exfiltration, table names, databases, filenames, etc.
For example, multiple tables may be exfiltrated from the same CloudSQL
instance, or multiple files from the same Cloud Storage bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis webpage provides reference documentation for the \u003ccode\u003eExfilResource\u003c/code\u003e class within the Google Cloud Security Command Center v1 API, with the latest version being 3.24.0.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eExfilResource\u003c/code\u003e class represents a resource that has been exfiltrated or the destination of exfiltrated data.\u003c/p\u003e\n"],["\u003cp\u003eIt implements several interfaces, including \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e, as well as inheriting from the base \u003ccode\u003eObject\u003c/code\u003e class.\u003c/p\u003e\n"],["\u003cp\u003eKey properties of \u003ccode\u003eExfilResource\u003c/code\u003e include \u003ccode\u003eComponents\u003c/code\u003e, which is a collection of subcomponents involved in exfiltration, and \u003ccode\u003eName\u003c/code\u003e, representing the resource's URI.\u003c/p\u003e\n"],["\u003cp\u003eThere is a comprehensive listing of versions available for the ExfilResource class from 2.2.0 to 3.24.0, showing the different releases of this class.\u003c/p\u003e\n"]]],[],null,[]]