Professional Documents
Culture Documents
March 1, 2023
Legal Notices
© 2023 Automation Anywhere, Inc. All Rights Reserved.
See the list of Automation Anywhere trademarks at https://www.automationanywhere.com/trademark.
All other customer or partner trademarks or registered trademarks are owned by those companies.
The information contained in this documentation is proprietary and confidential. Your use of this information
and Automation Anywhere Software products is subject to the terms and conditions of the applicable
End-User License Agreement and/or Nondisclosure Agreement and the proprietary and restricted rights
notices included therein.
You may print, copy, and use the information contained in this documentation for the internal needs of
your user base only. Unless otherwise agreed to by Automation Anywhere and you in writing, you may
not otherwise distribute this documentation or the information contained here outside of your organization
without obtaining Automation Anywhere’s prior written consent for each such distribution.
Examples and graphics are provided only as reference information and might not match your site.
Content
Automation 360
Getting started with Process Discovery
Process Discovery enables organizations to accelerate the automation of business processes and discover
the fastest path to process optimization and business ROI (return on investment). You can use Process
Discovery in various industries such as: healthcare, life sciences, and finance.
Process Discovery is the first step in automation used to identify which processes can be automated in a
business. Process Discovery uncovers business processes by capturing user interactions with various systems
and analyzing the interactions to identify patterns. You can capture and analyze user interactions with any of
these systems:
• Enterprise solutions: ERP (enterprise resource planning), CRM (customer relationship management),
BPM (business process management), and ECM (enterprise content management)
• Personal productivity applications: Microsoft Excel and Outlook
• Terminal and virtual environments: Citrix XenApp and Remote Desktop
Many companies begin their automation projects with manual observation and documentation. Manual
production and review of process documentation requires interviewing business users and mapping work
flows while they are performing daily operations. This involves additional resources which can be time-
consuming for all involved. This additional effort is also subject to inaccuracies due to users behaving
differently while being monitored. As a result, many of the automation opportunities remain undiscovered.
Process Discovery uses visualization tools to view process details and metadata, and review identical
processes that differ across regions, teams, or apps.
You can use Process Discovery to identify the processes in your business that you can automate. Process
Discovery helps you:
The following diagram shows the Process Discovery end-to-end workflow for Admin, IT, and power users:
Administrator
Creates users in the Process Discovery platform and has administrative permissions to manage the
tenant, cycles, users, observers, and integrations.
Power user
Creates mining runs, explore processes, classifies application signatures, and creates web applications.
The power user does not have administrator privileges.
Discovery user
Creates mining runs and processes, and can review events.
Limited user
Can access only the Client Dashboard and assets attached by a higher permission user.
Procedure
Note: If the user does not activate the account within 24 hours of receiving the email
invitation, click the Didn't receive confirmation instructions link on the login page to
resend the confirmation email. Enter the email address in the field provided and click resend
confirmation instructions.
11. To reset a user password for a fully registered user, click Actions > Force Password Reset.
12. Click Yes to reset the user password.
A message appears notifying you that the user will have to change their password on the next login
attempt.
The Event Reporting interface uses Kibana which provides you reports about how people interact with
applications and screens. Using the reports, you can determine where to focus your process discovery.
Procedure
1. To create your Event reporting password, log in to your Process Discovery platform tenant.
2. Click your account initials in the upper-right corner and select Manage Users
3. Locate your account details in the users list.
Tip: To quickly locate your account, click Filter. Enter your email address, select a role,
and click Apply.
4. In the Actions column, click the drop-down arrow and select Set Event Reporting Password.
The Set Event Reporting Password window displays.
5. Enter your password and click Set Password.
The password is ready to use the next time you log in
Prerequisites
This task is performed by an Administrator. Before you configure Observer activity for data collection, you
create domain list and application list.
5. In the Type field, select Allow to capture URLs or Block to exclude the URLs.
Note: The blocked URLs will not be displayed in the screen shots from the Events page.
Note: When specifying domains, you must explicitly indicate what domains to include or
exclude. For example, if chase.com is blocked, the secure05c.chase.com would not be
blocked. You must include secure05c.chase.com on the list.
You can now select this Block or Allow URL list from the Observers page for data you want to capture
or exclude, for an individual observer or group observers, based on your requirements.
1. Click your account initials in the upper-right corner and select Application List.
2. Log in to your Process Discovery platform as an administrator.
3. Click Create List.
4. In the Name field, enter a name for the list.
You can now select this Block or Allow Application list from the Observers page for data you want to
capture or exclude, for an individual observer or group observers, based on your requirements.
Note: To create a default Block and Allow URL or Application list for all new observers in
a tenant, click your account initials in the upper-right corner and select Manage Account. In
the Observer Settings section, update the URL or Application Block and Allow List.
Prerequisites
After the Neo Sensor is installed on the Observers machine, ensure that you:
• Enabled the sensor recording. For more information on enabling or disabling the recording, refer to
Enable and disable the users recording.
• Created your domain and application list before you configure Observer activity.
Note: To enable or disable the recordings for new observers in a tenant, click your account
initials in the upper-right corner and select Manage Account. In the New Observer Recording
section, select Enable or Disable to set the recording configuration for all new observers. Click
Save to save your changes.
To configure an individual observer or group configure observers for data collection with capture settings,
perform the following steps:
Procedure
Option Action
None No action to select. All URLs are captured by the Neo Sensor.
Allow Select the Allow URL list you created from the Domain List page from the
drop-down field.
Block Select the Block URL list you created from the Domain List page from the
drop-down field.
7. In the Application Block and Allow List section, select one of the these options:
Option Action
None No action to select. All URLs are captured by the Neo Sensor.
Allow Select the Allow Application list you created from the Application List page
from the drop-down field.
Block Select the Block URL list you created from the Application List page from
the drop-down field.
8. In the Configure Applications window, enter specific applications in the text field you want to
capture and click Add.
Based on your business needs and the applications you set to capture or exclude, you might need to
capture Screenshots and Titles for data processing of screen signatures.
The application is listed in the Application Name column.
9. To disable capture settings for the application, select the icon for Screenshots, Keystrokes, or Titles.
An X mark appears on the icon.
10. To configure observers by a single user, or group of observers with the same user name, select Use
configuration for observers owned by this user (<user name>).
This option is available for an individual observer only.
Note: When you use this option, the allow and block list that is created for new
observers is used for users with the same user name.
Create a cycle
Learn how to create a cycle for each data collection and add permitted users to the cycle so they can
access the associated events for data analysis. Cycles are defined as a collection of events based on a set of
Observers during a given time range.
Prerequisites
Administrators have access to all event data, and can define which Permitted Users (Data Review, Discovery,
or Power user roles) can access the cycle data throughout the Process Discovery platform. The
Administrator informs users when the cycle is ready for them to review. Power users and all other non-admin
users do not have access to create their own cycles and cannot review data until the Administrator creates
the cycle for them. Creating a cycle for Power and all other non-admin users allows the users to access the
data to review events and mine for processes.
To create a cycle, perform the following steps:
Procedure
When using web applications from the Process Discovery platform, the browser name is captured but the
web application or software as a service (SaaS) is not. Web application events (where the application name is
not captured) are stored in the Unclaimed Browser Events section of the Web Applications page. To classify
web application events that are related to the task or process, you must create specific web applications for
the events to be claimed in the application. From the Web Applications page, you can:
• Review events in the Unclaimed Browser Events section to locate and filter related process events from
their native browser applications. Typically, Google Search, personal searches, or web mail events are
not relevant to a task or process.
• Create specific web applications that are used in the task or overall process flow, for example: Amazon
Web Services, Slack, Zendesk, and so on.
To review events in the Unclaimed Browser Events section and create web applications, perform the
following steps:
Procedure
6. From the Events page, verify what web application the events belongs to.
Tip: We recommend that you note the web titles or URLs as you review the events
because you will create a web rule pattern (regular expression or regex) for each of the
targeted web applications. Additionally, you can use the Filter option to locate specific web
applications by Observer Name (for example) and click through the events in their workflow.
Based on your situation, you might filter on URLs because URLs are unique, whereas titles are
not necessarily unique. For example, if you have two applications with HOME as the title, you
should use a URL web based rule instead of the title.
7. From the Unclaimed Browser Events column, continue to review the set of browser events from the
Events page and determine if the events need to be claimed as web application events.
8. After you have located the titles or URL that you need to create web applications, navigate back to the
Web Applications page.
9. Click Create Web Application.
10. In the APPLICATION NAME field, enter the name of the application.
For example, enter Google Search ICD 10 Lookup.
11. In the APPLIED RULE TYPE section, select the rule type (Title or URL) to use.
For example, select Title.
12. In the RULE PATTERN (REGEX) section, enter a pattern that matches the title or URL of your target
application in the text box.
For example, enter icd10 lookup in the text box. We recommend that you remove "Google Search"
from the application name because there may be similar events (icd10 lookup) in other browsers that
you can also include in the rule pattern.
You can also click the copy icon to copy the title of the web application and paste into the text box.
For example, you only need the title, KTBSonline and there are two KTBSonline titles listed in the
browser events column. The two titles are:
• Verify Login Information | KTBSonline - Google Chrome
• Enroll in Open Enrollment Benefits | KTBSonline - Google Chrome
To capture the events from both titles, you can enter the rule pattern as: Verify Login Information \|
KTBSonline - Google Chrome|Enroll in Open Enrollment Benefits \| KTBSonline - Google Chrome, or
you can just enter KTBSonline and keep the rule pattern simple.
Continuing with the example for KTBSonline, the backslash (\) character precedes the vertical (|)
character to indicate that this is not an OR function in the rule.
To include more than one title in the rule pattern, use the vertical bar (|) character to indicate the OR
function. For example, to include results for PDFfiller OR pdfFiller, enter the rule pattern as: PDFfiller|
pdfFiller.
The caret (^) character is another commonly used character for creating web rules. Use the caret
character at the beginning of the rule pattern when you want to match the exact event title at
beginning of the text. For example, you want events only where KTBSonline is at the beginning of the
text in the application. In the text box, enter the rule pattern as: ^KTBSonline.
13. Click Create.
The system takes a few minutes to create the web application. To verify that the rule is updated, click
the magnifying glass icon in the Actions column. After the web application has completed, a pop-up
notification appears in the bottom left corner.
Prerequisites
We recommend that you collect Observer events for at least two to five weeks to ensure that all processes
assigned to Observers are completed before data analysis. After a few weeks of collecting Events, you can
review the Events. From the Events pages, power users can:
Procedure
Note: In the Events table, the Observed At date and time range is the time that a user is
looking at the events in the application. The Observed At date range is not related to the
Observers location. For example, if the Observer is in India and the user is looking at the
events in the application in California, the Observed At date and time is in California time.
For each Event ID, the associated Event screen appears to the right. The following image and table
describe the metadata (1-4) details associated with the screen and the icons (5 and 6) used to enlarge
the image.
Metadata Description
Metadata Description
Image Viewer
5 Enlarges the image to full screen mode.
icon
Option Action
Add Rule A Rule is single condition. Use this to add additional conditions, such as
AND, OR. Refer to the AND,OR examples for more information.
AND Filter events only which satisfy BOTH conditions will be included.
Option Action
OR
Filter events only which satisfy EITHER condition will
be included. For example, the OR operator is
selected and you select Application Name = Chrome
and Application Type = windows. The filter rules will
include only events EITHER in Chrome or in
windows.
Add group Use this to filter for a combination of rules. A Group can also be a
collection of Groups, or a mix of both.
Option Result
Option Action
Option Result
>=, <=
Note: This applies only for
Observed At and ID conditions.
Prerequisites
• Before you create a PDD, you create a mining run from the Mining Runs page. (Alternatively, you can
also create a PDD from a set of events from the Events page using the Import to Graph option.)
• From the Process Explorer page, review the various paths taken by the observers, where the thickest
path is the most frequent path taken.
• Identify the path you want to view from an event-level.
• Click the View in Instances Viewer icon to navigate to the Instances Viewer page where you can
select and annotate events to include in a PDD. You can also select a process to annotate directly from
the Instances Viewer page.
Procedure
4. After the process displays on the page, click the drop-down to select the instance to include in the
PDD.
5. Click the gear icon to add the Include in Process column.
The Include in Process column provides you a check box for each line order (refer to the Order
column) used to specify which steps to include in the PDD.
6. Click Annotate to update field labels for the selected steps. For all steps that you want to include in the
PDD, leave the box checked and update the action and label from the screen on the right.
Two fields will appear above the screen image.
7. From the drop-down, select a Control Type.
The Control Type refers to the selection performed in the application.
8. In the text field, enter a control label description for the Control Type and click Update.
We recommend that you enter a label description that corresponds with the label in the screenshot so
that when users review the PDD, the output makes sense to them.
For example, select Button from the Control Type drop-down and enter Click New Ticket in the
description field.
The Ann column will display user and the Field column will display the description entered in the text
field.
9. Repeat steps 6 through 8 for all steps that you want to annotate.
The Save Instance to Process button is enabled for all checked items that include both a label and
description. You must annotate all instances you want included in the process for the Save Instance
to Process button to appear.
10. Click Save Instance to Process.
The View Process Details button appears.
11. Click View Process Details to name the process.
12. In the Name field, enter a name for the process using this suggested format: 5577-21245E Instance 1
for <Mining Run><Process><Path><Instance>.
13. Click Save Process to save the process with a name.
A message appears at the bottom left side notifying you that the process is saved successfully. Click the
hyperlink to return to the Process Explorer page. You can now create groups for the events and
generate a PDD.
After you selected your instances, you can create groups for the events and build your PDD.
Procedure
1. Click Create Group to place the steps in different groups for the PDD.
You can create groups for tasks that are part of the process.
2. In the Create Group window, drag a step from the process workflow and move it into the Start Node.
The Start Node is the beginning of the task. For help building the group of steps as tasks in the overall
process, refer to the View Instances page for the selected screens. For example, to create tasks
related to completing fields on a checkout page, you can
• Group all steps in one group and name the group Checkout; or
• Create multiple groups for individual tasks like Add Payment in one group or add Shipping address
in another group.
3. Select the last step in the group and place the screen in the End Node(s).
The End Node(s) is the end of the task.
4. Enter a name in the Group Name text box.
5. Select a color for the group from the drop-down next to the Group Name text box.
6. Click Save to save the group.
7. Repeat steps 2 through 6 for all steps you want to group.
8. Open a new browser tab and navigate to the Process Discovery platform.
Note: The default images for each step is a zoomed-in snippet of the events interaction
point.
The events interaction point is the area on the screen where the user is focused which is
typically denoted by a red circle on the screen shot.
The Process Specifications page appears and the message Generating PDD displays in the bottom left
corner.
20. Click Download PDD to open the PDD document.
The generated Word document is available from your Downloads folder on your machine. The zip file
contains all the images.
21. Review and modify the document, (if needed) and then save your PDD.