task-mining
2023.10
false
  • Release notes
    • 2023.10.6
    • 2023.10.5
    • 2023.10.4
    • 2023.10.3
    • 2023.10.2
    • 2023.10.1
    • 2023.10
  • Getting started
  • Setup and configuration
  • Unassisted Task Mining
    • Introduction
      • Settings
      • Team
    • Project management
    • Installing the recorder
    • Best practices
  • Additional resources
UiPath logo, featuring letters U and I in white
Task Mining
Automation CloudAutomation Cloud Public SectorAutomation Suite
Last updated Nov 21, 2024

Settings

Output configuration

Output configuration is a mandatory setting that is used to configure the display of the output document. Configure the way you want the information to be processed by using one of the below options:

  • Continuous Upload (recommended) - data is uploaded as soon as users have processed (ready for analysis) data available.
  • Via shared drive (using the Uploader tool) Refer to Using StudyUploader for more information.

    Note: All data is encrypted before being sent to the service and remains encrypted until a model job-specific container is created for processing and then the results are again encrypted before being written to disk.

Continuous upload



An AI Center™ project is automatically created when a Task Mining project is created and selected in the continuous upload configuration.

To select another project for the continuous upload:

  1. Select Edit in Configure Upcoming Output.
  2. Select the AiCenter Project from the dropdown list.
  3. Set a name for the Analysis name.
  4. Select Save to apply changes.



Network shared folder

Note: This option requires manual work and additional supervision. It is advised to use the Continuous option, if possible.
Collecting data using this option requires first set up a network shared folder. Refer toSetting up the shared network folder . Later install an additional desktop component Study Uploader. Refer to Using StudyUploader for details.
  • In the Network Shared Folder area specify a path to a network shared drive that can be accessed by users with write permissions. Use the following path format: format: \\\network\folder\path
  • The Available intermittently checkbox enables you to continue the recording process in case the Network Shared Folder you set up is not available and keeps the recorded data locally until the access to the folder is restored.



PII data masking

Personally identifiable information (PII) is information that, when used alone or with other relevant data, can identify an individual. This can be switched on or off based on your preference.



PII detection model looks for a standard pre-configured limited category of content.

  • Sensitive PII information includes legal statistics such as:

PII Type

Description

Social Security Number (SSN)

It is a 9-digit number issued to US citizens, permanent residents, and temporary working residents.

Credit/Debit Card

The number, expiration date, and card verification code for a credit or debit card.

Banking Routing

A US bank account routing number. These are typically 9 digits long.

Phone

A phone number. Including fax and pager numbers.

Address

A physical address, such as "Suite #1, Building 1234". An address can include a street, building, location, city, state, country, county, zip, precinct, neighborhood, and more.

Name

An individual's name, but does not include titles, such as Mr., Mrs., Miss, or Dr.

Email

An email address, such as myname@email.com.

License ID

The number assigned to a driver's license is an official document permitting an individual to operate one or more motorized vehicles on a public road. A driver's license number consists of alphanumeric characters.

Passport

Passport numbers range from 6 - 9 alphanumeric characters.

Note:
  • Some PII Types of data are Country Specific and don't apply to every country.

  • For the PII Masking feature to work as intended, the desktop application version 21.6.71 or higher must be installed.

Recorded apps

View and manage the list of applications where tasks made by the users are captured. The Recorder Client logs only data for these applications.

Under the Recorded Apps section, create the Recorded Applications list by adding applications or websites. This is a mandatory step to be able to record successfully. The Client App will only log data for these applications and websites.

Below is an overview of the available lists:

  • Globally for all users tab - the list of applications that are implemented and recorded for all the users. Once you set the list of the Recorded Apps, users cannot change it. However, they can request other applications to be added through the Recorder Settings. Refer toRecorder settings for details.

    • Allow recording - the list of applications and websites that will be included in the recording.
    • Deny recording - the list of applications and websites that the Recorder will ignore when recording.
  • On Individual Users' Request tab - the list of applications that users have requested to be recorded through the Recorder settings.

    • Allow recording - the list of applications and websites that will be included in the recording.
    • Deny recording - the list of applications and websites that the Recorder will ignore when recording.

Add an application or website to the Allow recording list

To add an application or website to the Allow recording list of the Globally for all users list, use the Search option to be sure the app is not already added and follow the applicable scenario as listed below.

Perform the search as in the illustration below:

Recorderd applications list

You can also select applications and/or websites from the Deny recording list and move them to the Allow recording list.

Follow these steps to add an application or website that is not available in the Allow recording list tab.

  1. Select Allow

  2. The Allow Application or Website pop-up is displayed.
  3. Enter the name of the application or the domain of the website for which you want to allow recording and click on Add. See the illustration below for an example.

    Allow application or website
For executables, make sure that the name you enter is the same as the file name of the executable, and that it is in the .exe format. For websites, make sure that you enter the correct domain name and the extension, for example, uipath.com.
Note: Applications that require OS Administrator permissions to run won’t be captured unless the user runs the Client App as Administrator.

Add an application or website to the Deny recording list

To add an application or website to the Deny recording list of the Globally for all users list, use the Search option to be sure the app is not already added and follow the applicable scenario as listed below.

Perform the search on both the Globally for all users tab and the On individual Users' Request tab.

Follow these steps to add an application or website that is in one of the lists on the On Individual Users' Request tab:

  1. Locate the application or website in the list and select the option button.
  2. Click on Deny globally

You can also select applications and/or websites from the Allow recording list and move them to the Deny recording list.

Follow these steps to add an application or website that is not available on the On Individual Users' Request tab and not already available in the Deny recording list on the Globally for all users tab.

  1. Go to the Globally for all users list.
  2. Select Deny.

  3. The Deny Application or Website pop-up is displayed.
  4. Enter the name of the application or the domain of the website for which you want to deny recording and click on Add.
For executables, make sure that the name you enter is the same as the file name of the executable, and that it is in the .exe format. For websites, make sure that you enter the correct domain name and the extension, for example, uipath.com.

Delete an application

Follow the steps below to Delete an application from the lists on either the Globally for all users or the On Individual Users' Request.

  1. Locate the application or website in the list and select the option button.
  2. Select Remove.
  3. The application or website is removed from the list.

    Important: If the recorded apps list is empty, you will be prompted with a dialog that allows you to add apps or skip and proceed, but by skipping, you will not record any steps. See the illustration below.


Data collection policies (optional)

The Data Collection Policies allows the Company Admin(s) to easily inform the users about the recording process and gather their consent to record the data for a Task Mining project.

Show consent dialog for users

  • Show consent dialog for users option is enabled by default due to UiPath® privacy policy. Refer to the Privacy policy page on the UiPath website. A consent dialog is displayed for a user when you Start a user recording process. Users will be presented with a dialogue to Accept or Decline the recording terms and conditions before the desktop application begins capturing the data.
  • You have the option to set up a specific timeframe for the recurring consent collection. Users will be prompted with the consent dialogue after the specified amount of days passed since the user accepted the consent the first time.
  • To browse the consent collection history, access the View users consent logs link.

Anonymize user names on the Results page

Enables you to anonymize user names that are displayed on the Results page to protect the privacy of individuals represented by the data.

Enable Advanced recorder engine

The Enable Advanced recorder engine option enables you to use enhanced data recording options in the users desktop applications. This will enable recording users to install browser extensions used by UiPath® Studio and Assistant (starting from version 2022.10) to improve the precision of captured selectors.

The Enable Advanced recorder engine option is selected by default.

Attention:

Only disable the Enable Advanced recorder engine option in case recording users encounter issues when recording.

Was this page helpful?

Get The Help You Need
Learning RPA - Automation Courses
UiPath Community Forum
Uipath Logo White
Trust and Security
© 2005-2024 UiPath. All rights reserved.