Professional Documents
Culture Documents
Entrenamiento y Tutorial
– El único curso de RPA que
necesitas
Introduction:
Automation Anywhere is one of the well-known RPA vendors giving great and
easy to understand RPA abilities to robotize any mind-boggling errands. It is
one of the “Progressive Technology” that progressions the manner in which
the endeavour works.
This tool joins current RPA with scholarly components like common dialect
comprehension and perusing any unstructured information.
Report Designer
Automation Anywhere provides graphical reports that display the status of
tasks and workflows, as well as the ROI over time.
You can view the following types of reports:
1. Task Run: Displays how many times a task has run successfully,
and how many times it has failed during the period.
2. Workflow Run: Displays how many times a workflow has run
successfully and how many times it has failed during the period.
Types of Records
1)Web Recorder 2) Smart Recorder 3) Screen Recorder
1)Smart Recorder:
Recorder is based on provided window title
Object, Co-ordinates, Image playback mode
Adjustable object identification criteria (In AA -> Binoculars)
Smart Recorder tool is capable of capturing window objects and
controls such as:
Text from drop-down menus, List boxes, Buttons, Mouse click
actions
Status from radio buttons and check boxes
To launch the Smart Recorder
Click New and select Smart Recorder
Click the Smart Recorder link
2)Screen Recorder:
Screen Recorder is one of the three ways to create a bot.
Captures all mouse events; movements, clicks, click and drag
Captures all keystrokes as Insert Keystrokes
Requires to have a same OS and same Screen Resolution.
Limited to static screens and simple desktops or web applications.
Faster than creating a task manually.
3)Web Recorder:
Automate Internet-related task actions.
SMART Technology ideal for websites
Records based on a provided URL
Extracts single data, pattern-based data, and tables
Navigates web controls
Strictly a Browser based tool, supports IE 100%
Here is the Image with specifications of WEB RECORDER
Notification Property
When planning to run your tasks, you can set up email
notifications that are sent to one or more email addresses that you
specify.
In the Notification tab under Properties, select ‘Send email
notification when task finishes’ and specify one or more email
addresses.
If you select ‘Send email notification when task finishes’ check
box, but do not specify an email address.
Automation Anywhere uses the email address that is specified in
the ‘To:’ field in the Tools -> Options -> Email Notification.
HOTKEY Property
You can assign a hotkey to an automated task by using the
Hotkey property.
To assign a hotkey, follow these steps:
On the Properties tab, select Hotkey.
Either specify a hotkey in the field provided or select a hotkey from the pop-up
window
Security Property
Running this task in stealth mode: Use this option to prevent
information from being displayed on the screen while the task is
running in Auto-Login mode.
Disable mouse and keyboard for this task: Use this option to
disable the computer mouse and keyboard while the task is
running in Auto-Login mode.
AUTO LOGIN
Auto Login must be completed to schedule or trigger a task.
Check Bypass Legal Disclaimer if present
In rare case that login/unlock keystrokes do not function correctly,
contact AA Support
Variable Manager
Located on the far right of any task window
Accessed by clicking the Variable Manager tab and hidden by
clicking the X in the top right corner
Provides the list of all Local Variables available within a particular
task
Variable Manager includes
Copy / Copy All / Paste: duplicate existing variables
Add: create new variables
Edit: modify existing variables
Delete: remove existing variables
Default variables
My-list-variable – useful when referencing a list of values
Prompt-Assignment – useful when referencing a single value
COMMANDS LIBRARY
DATABASE COMMAND
Before using Database command you should be clear with:-
Database Concepts
Using SQL
Database Command
Collection of associated two-dimensional tables
Database programming is managed in the database system
Data is normalized within a database
Organized in layers
Redundancy is removed
Indexes are optimized for access
SQL (Structured Query Language) is the most common means of
accessing data in a RDBMS
Go to Cell subcommand
Works on the active spreadsheet
Specify the session name
Select a specific cell
Move a specific way from the active cell
Get Cells subcommand
Reads the content of the specified cell on the active spreadsheet
Select the Cell Location or use Active Cell
Select the receiving variable
Multiple cells can be specified
Values are assigned to an $Excel Column (index)$, a system variable for use
within loops
String Operation Command
Multiple subcommands are available
Accessed by dragging and dropping one of the String Operation
subcommands into an existing task
The subcommand can be changed from the Select Operation
drop-down list Before-After Command
• This command is used to specify a text range to extract, by using Before and
After keywords
• To improve your ‘Before-After’ sequence command, ‘OR’ or ‘AND’ Logical
Operators can be used.
• Use the ‘AND’ operator to assure ‘After’ and ‘Before’ conditions.
• Use the ‘OR’ operator to secure either ‘Before’ or ‘After ‘conditions.
• Define the product of characters to be selected, starting from the first
character after the Before keyword.
• The selected series can be provided to remove spaces, and we can save the
series to the variable
Join Command
• Used Join all the elements in a group of the variable into a single order.
• It can be used only on a list of variables.
Command Length
• It provides the period of a defined string.
Lower Case Command & Upper-Case Command
• It Converts text to ALL lower case or ALL upper case.
Replace Command
• It works like a Find and Replaces system
• This command is used to select the product of time a sub-string is followed in
the source string.
Reverse Command
• It reverses the selected source string
Sub String Command
• It creates a unique string from the selected source string.
• Used to assign an opening point for the current string.
• Used to assign a length of the unique string.
Split Command
• Used to select source string into multiple destination strings.
• Use a defined delimiter to decide where to split the string.
• Select the number of generations a string is split.
• Output must be in a file variable.
Trim Command
• Used to remove extra spaces from a text string.
• We can Trim from left or right.
XML Command
The XML Command captures and manipulates data that has XML formatting
Start XML Session
End XML Session
Insert Node
Delete Node/Attribute
Update Nodes
Validate XML Document
Get Node(s)
Save Session Data
Execute XPath Function
Terminal Emulator
Terminal Emulator Command allows connection to the following terminal
types:
1. ANSI
2. VT1000
3. TN3270
4. TN5250
Terminal Emulator provides the following subcommands:
Connect / Disconnect
Send Text / Get Text
Set Field / Get Field
Get All Fields
Wait
Control
FTP Command
FTP / SFTP Command
Produces the capability to upload and download FTP/SFTP files
Make website reserves
Subcommands
Connect / Disconnect
Get Files – download files
Get Files – download an entire folder
Put Files – uploads files
Put Folder – upload an entire folder
Delete / Rename Files
Create / Delete / Change Folder
PGP Command
The PGP command helps you to automate the process of
encrypting and decrypting files.
The command supports both types of encryption: symmetric
(passphrase) and asymmetric (public/private keys):
PGP Passphrase: Requires a pass phrase to encrypt and decrypt.
PGP Public/Private Key: Requires a PGP public and private key file
to encrypt and decrypt.
Sub-Commands
Encrypt Files
Decrypt Files
Create Keys
Create Keys Command
This command to create public and private encryption keys. You
can add additional security to the keys by specifying a password
that encrypts the keys.
Object Cloning
SMART Technology used for desktop applications and websites
Allows the user to “radar-lock” on an object and specify additional
search criteria to uniquely identify objects
Captures based on a provided window title
Object, Coordinate, Image playback modes
Most customizable/adjustable technology in AA
Adjustable object identification criteria (In AA Binoculars)
Tip: Ensure web browser zoom is set to 100%
Encrypt Documents
subcommand
It Grant’s the permissions by selecting the Encryption level
Decrypt Document
subcommand
By Providing the proper password it specifies the Output file
Error Handling Command
Manage Windows Control
Helpful to catch Windows control features, such as buttons, text
boxes, list box items, combo boxes, menu tabs, tables, check
boxes.
Once these are captured, particular activities can be implemented
or can be allocated to changeable commands.
Available Windows controls
Button – Edit (Text box)
Radio Button – Checkbox
Combo Box/Drop Down – Get Text
Tab / Tab Item – List / List Item
Menu/Menu Bar/Menu Item – Tree / Tree Item
Table
Bot Runner
Recorder Hierarchy
Command Portability
Dashboard
View task relevant activities such as tasks completed successfully,
tasks in progress, , repository details and tasks, upcoming tasks
that have failed on the control room dashboard.
Repository Manager
The most powerful capability that the Repository Manager
provides is the ability to run and schedule tasks on ‘Runtime’ i.e.
client users with ‘TaskBot’ privileges. It also offers the capability to
delete uploaded files to the Control Room administrator.
Operations Room
The Operations Room is a powerful monitoring console that
provides detailed information about all automation on the network.
Operational Analytics
Tracking Bot Activity
Tracks all bot activity over every execution instance
Helps trouble-shoot success, failure and reasons
Assess capacity mismatches and optimize number of bots
Measure ROI of overall RPA program at operational level
Logging and Monitoring
Logs all events at lowest grain by user
To build a detailed audit trail of all activity
Build compliance reports that track failed access/bot execution
events
Assess and tighten security and access protocols
User Management
Client User management involves creating users after defining
specific roles as soon as the Control Room is hosted. These users
can be either Non-Active Directory Users or Active Directory
Users, as configured during installation.
Audit Trail
• Grants an administrator and user an essential data for observing task flow
and status to internal observance regulations, as well as to limit tampering with
critical processes.
Task Schedule
In Control Room, users with required privileges can schedule a
selected task on selected Runtime Client(s) and also export the
upcoming task schedule details to a CSV file.
The Control Room Administrator can schedule tasks to play on
Client(s) machines when Version Control is enabled in the Control
Room.
Security
Activities and access to Control Room for Users (Administrators,
Clients and non-Clients) are governed by the role defined for
each.
The role-based accessibility model ensures each User has
console-access, to view information or data that is relevant to the
role assigned by the Control Room Administrator.
Clients
Displays the clients registered with the Web Control Room
Credential Manager
The Credential Manager allows you to add a Credential Key and
Attributes in the Control Room Credential Vault that can be
assigned in commands as Credential Variables.
App Management
Helps in Linking the Bot Insight application to the Web Control
Room
Using MetaBot
The MetaBot Designer helps you to:
Create MetaBots.
Add Assets – Screens and DLLs to your MetaBots.
Manage your MetaBot Assets.
Configure and Calibrate the Screens.
Create custom objects on the Screens.
Create Logic to represent a navigational flow using Screens and
DLLs.
Upload the MetaBots to the Control Room for use by other
Enterprise Client users.
Edit MetaBots created by other users.
Export and Import MetaBots for use in different Control Room
setups.
Here is the Design of METABOT
Features
1. New – Use this to create a New MetaBot. The MetaBot thus
created does not include any Assets or Logic; its empty. You can
start with either – ‘Record Screen’, ‘Add Screen’ or even ‘Add DLL’
based on the purpose for which the MetaBot needs to be created.
2. Record – Record is an alternate method of creating a MetaBot.
Here, at-least one MetaBot will be present as its recorded.
3. My MetaBots – This tab is shown by default; it displays all
MetaBots. This tab is always open, by default.
4. Configure –use this to edit your application properties for the
recorded/added screen.
5. Calibrate- use this to instantly compare an existing screen with a
newer screen to identify changes if any
6. Upload – This is use to upload MetaBots to the Control Room for
downloaded by other users.
7. Delete- This is use to delete MetaBots, Screen and Dlls.
8. Export/Import –This is use to export and import MetaBots for use
in different Control Room setups.
Automation Anywhere BotInsight Training
BotInsight – An Overview
Benefits & Features
BotInsight Architecture
Transactional Analytics
Real time measurement and analysis on data flowing through the
Bots
Under “Configure” hood the “Data Profile” tab shows the Analytics
variable in details with their types.
The type is recognized based upon the data stored in variables.
The types include
Numeric
Timestamp
String
3)Easy Dashboard Customization
We analyze any task data interactively
We can add more widgets, filter, compare over time etc.
We can Customize content and visual charting.