Skip to main content

Celonis Product Documentation

Task Mining Desktop Application

System requirements


  • .NET Framework 4.8

  • Windows 7, Windows 10 or Windows Server 2016

  • Windows 7 and Windows Server 2016 limitations:

    • Only legacy screenshot capturing is supported.

    • For Servers: Keep in mind that Task Mining can only run once per user. Multiple sessions for the same user are not supported.

  • Write access to the “Path for Transfer File Cache” (see Task Mining - Configuration Editor).

  • Firewall: Outgoing connections from the Task Mining Client to your Celonis platform team via HTTPS.

  • In case you want to use the Browser Extension as well: Localhost websocket connection on port 8080, that is used to communicate between the Task Mining desktop application and Browser Extension must be usable.  

  • Notification & Action Center in Windows must be enabled. This is typically the case unless explicitly disabled.

    • Before Client 2.13.0: Disabling the notification center might lead to unexpected behavior, such as the Client crashing.

    • Client 2.13.0 and above: Task Mining will still work with a disabled notification center, however users will not be able to receive notifications, such as:

      • The configurations could not be loaded. The application is currently inactive.

      • Celonis Task Mining will continue to run in background.

      • Successfully updated the client settings. (Notification for users when the configuration what data to capture changed)


If your machine is running on up-to-date Windows 10, this .NET Framework should already be installed. If it is not installed, you will see a pop-up window when you first start Celonis platform; this includes a link to the .NET Framework download page. You should download the correct version from there, but you will need admin rights to do so.


  • It is difficult to specify minimum hardware requirements for Task Mining, as performance depends on too many parameters.

  • Instead, as a rule of thumb, we recommend making sure the computers have some performance headroom left (ideally 20-30%) before installing Task Mining. If there is already no headroom left and the computer's resources are almost fully utilized, installing and running Task Mining might lead to a (further) system slowdown. 

  • On top, when in doubt, we recommend doing a quick test run before a full rollout.

Installing the Desktop Application software

  1. Download the "CelonisTaskMining.Installer-2.x.x.msi" file.

  2. Run the installer package and follow the instructions of the installation wizard.

Updating an existing installation


This is for both the Task Mining Client and the Configuration Editor desktop applications.

If the currently-installed version is 1.x.x:

The old version is restricted to per machine context (Admin):

  • Newer version installed per-machine (Admin); this will prompt for admin and replace the older version.

  • Newer version installed per-user (not Admin); this replaces the 1.x.x version.


For both of these scenarios, admin rights are required and you will be prompted for credentials.

If the currently-installed version is 2.x.x:

  • old version per machine and new version per machine; prompts for admin rights and replaces the older version.

  • old version per user and new version per machine; prompts for admin rights and keeps the older version. This means there will be two different installation folders and two Start menu entries for Task Mining.

  • old version per machine and new version per user; prompts for admin rights and replaces the older version.

  • old version per user and new version per user; replaces the older version without prompting for admin rights.


You can also (optionally) install browser extensions for Chrome and Edge. For further information, see Task Mining Desktop Application browser extensions (optional).

Configuration Editor (optional)


This is only required if you want to create or change the Task Mining XML configuration file.

  1. Download the "CelonisTaskMining.Configuration.Installer-2.x.x.msi" file.

  2. Run the installer package and follow the instructions of the installation wizard.

Installation without admin rights

On default Windows setups, the installer provides an option to install only for the current user; Admin rights are not required.

Configure Task Mining (deprecated)


This section only applies to version 2.0 and prior. From version 2.2, the configuration is centrally-managed in the Celonis platform and automatically downloaded by clients.

The Task Mining desktop application requires a configuration file (with file name extension .recconf) in XML format. This configuration file can be created with the Task Mining Configuration Editor.

The Task Mining desktop application tries to automatically retrieve a configuration file and searches in the following order:

  1. Recently-used configuration file; the desktop application stores this and will re-use it if possible.

  2. List of paths: the desktop application searches for a configuration file in a pre-defined list of paths (subfolders are not searched) in the following order:

    1. The current directory (installation directory of the desktop application).

    2. The home directory of the user.

    3. The user's My Documents directory.

    4. Celonis subdirectory in the Windows application data folder.

  3. Manually-selected configuration file: the user is prompted to select a configuration file.


Based on the order given, the desktop application will always use the first configuration file that can be loaded successfully. If you have multiple files stored in different folders, the configuration file that is actually loaded may not be as expected.

Password input

If the field type is known and the type is a password field, the text input will not be captured. This means the content of password fields is ignored if they are extracted via the Chrome extension or the SAP integration; the EnteredText, ClipboardContent, TargetElementValue and ElementTextSAP fields respectively will be set to "Null". For other applications, custom rules can be used to either generally hash the EnteredText and ClipboardContent fields or hash them for specific login screens. These can be identified, for example, using the URL or ActiveWindow fields.