Subcomponents of the asset that was exfiltrated, like URIs used during
exfiltration, table names, databases, and filenames. For example, multiple
tables might have been exfiltrated from the same Cloud SQL instance, or
multiple files might have been exfiltrated from the same Cloud Storage
bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe \u003ccode\u003eExfilResource\u003c/code\u003e class in the Security Command Center v2 API represents a resource where data was exfiltrated from or to, offering a way to track data exfiltration events.\u003c/p\u003e\n"],["\u003cp\u003eThis class inherits from \u003ccode\u003eobject\u003c/code\u003e and implements multiple interfaces, including \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e, providing functionalities for message handling, comparison, deep cloning, and buffer management.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eExfilResource\u003c/code\u003e class has two constructors, a default one and another that accepts an \u003ccode\u003eExfilResource\u003c/code\u003e object for creating a copy.\u003c/p\u003e\n"],["\u003cp\u003eIt includes properties such as \u003ccode\u003eComponents\u003c/code\u003e, which is a \u003ccode\u003eRepeatedField\u003c/code\u003e of strings representing subcomponents of the exfiltrated asset, and \u003ccode\u003eName\u003c/code\u003e, a string representing the full resource name.\u003c/p\u003e\n"]]],[],null,[]]