Skip to main content

Celonis Product Documentation

Task Mining Desktop Application

System requirements

  • Windows 10 (from version 2.2) or Windows 10, release 1903 or higher (version 2.0).

  • .NET Framework 4.8 (or higher).

  • Firewall: Outgoing connections from the Task Mining Client to your EMS team via HTTPS.

Note

If your machine is running on up-to-date Windows 10, this .NET Framework should already be installed. If it is not installed, you will see a pop-up window when you first start Task Mining; this includes a link to the .NET Framework download page. You should download the correct version from there; you will need admin rights to do so.

Installing the Desktop Application software

  1. Download "CelonisTaskMining.Installer-2.x.x.msi".

  2. Run the installer package and follow the instructions of the installation wizard.

Updating an existing installation

Note

This is for both desktop applications, the Task Mining Client and the Configuration Editor.

If the currently-installed version is 1.x.x:

The old version is restricted to per machine context (admin):

  • Newer version installed per-user (not admin); this replaces the 1.x.x version.

  • Newer version installed per-user (not admin); this replaces the 1.x.x version.

Note

For both of these scenarios, admin rights are required and will be prompted for.

If the currently-installed version is 2.x.x:

  • old version per machine and new version per machine; prompts for admin rights and replaces the older version.

  • old version per user and new version per machine; prompts for admin rights and keeps the older version. This means there will be two different installation folders and two Start menu entries for Task Mining.

  • old version per machine and new version per user; prompts for admin rights and replaces the older version.

  • old version per user and new version per user; replaces the older version without prompting for admin rights.

Tip

You can also (optionally) install browser extensions for Chrome and Edge. For further information, see Task Mining Desktop Application browser extensions (optional)

Configuration Editor (optional)

Note

This is only required if you want to create or change the Task Mining XML configuration file.

  1. Download "CelonisTaskMining.Configuration.Installer-2.x.x.msi"

  2. Run the installer package and follow the instructions of the installation wizard.

Installation without admin rights

On default Windows setups, the installer provides an option to install only for the current user; admin rights are not required.

Configure Task Mining (deprecated)

Notice

This section only applies to version 2.0 and prior. From version 2.2, the configuration is centrally-managed in the EMS and automatically downloaded by clients.

The Task Mining desktop application requires a configuration file (with file name extension .recconf) in XML format. This configuration file can be created with the Task Mining Configuration Editor.

The Celonis Task Mining desktop application tries to automatically retrieve a configuration file and searches in the following order:

  1. Recently-used configuration file; the desktop application stores this and will re-use it if possible.

  2. List of paths: the desktop application searches for a configuration file in a pre-defined list of paths (subfolders are not searched) in the following order:

    1. The current directory (installation directory of the desktop application).

    2. The home directory of the user.

    3. The user's My Documents directory.

    4. Celonis Task Mining subdirectory in the Windows application data folder.

  3. Manually-selected configuration file: the user is prompted to select a configuration file.

Warning

Based on the order given, the desktop application will always use the first configuration file that can be loaded successfully. If you have multiple files stored in different folders, the configuration file that is actually loaded may not be as expected.

Password input

If the field type is known and the type is a password field, the text input will not be captured. This means the content of password fields is ignored if they are extracted via the Chrome extension or the SAP integration; the fields 'EnteredText', 'ClipboardContent', 'TargetElementValue' and 'ElementTextSAP' respectively will be set to Null. For other applications, custom rules can be used to either generally hash the fields 'EnteredText' and 'ClipboardContent' or hash them for specific login screens. These can be identified, for example, using the fields 'URL' or 'ActiveWindow'.