Subcomponents of the asset that is exfiltrated - these could be
URIs used during exfiltration, table names, databases, filenames, etc.
For example, multiple tables may be exfiltrated from the same CloudSQL
instance, or multiple files from the same Cloud Storage bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe latest version available for the \u003ccode\u003eExfilResource\u003c/code\u003e class in the Google Cloud SecurityCenter V1 API is 3.24.0.\u003c/p\u003e\n"],["\u003cp\u003eThis document provides reference material for the \u003ccode\u003eExfilResource\u003c/code\u003e class, which represents a resource that has been exfiltrated or designated for exfiltration.\u003c/p\u003e\n"],["\u003cp\u003eThe class implements several interfaces, including \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e, offering methods for object comparison, cloning, and message handling.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eExfilResource\u003c/code\u003e class includes properties like \u003ccode\u003eComponents\u003c/code\u003e (a list of subcomponents) and \u003ccode\u003eName\u003c/code\u003e (the resource's URI).\u003c/p\u003e\n"],["\u003cp\u003eThere are numerous previous versions available for this resource ranging from 2.2.0 to 3.23.0, along with the latest version.\u003c/p\u003e\n"]]],[],null,[]]