- Overview
- UI Automation
- Core Activities split
- UI-based automation profiling data collection
- Applications and technologies automated with UI Automation
- Project compatibility
- UI-ANA-016 - Pull Open Browser URL
- UI-ANA-017 - ContinueOnError True
- UI-ANA-018 - List OCR/Image Activities
- UI-DBP-006 - Container Usage
- UI-DBP-013 - Excel Automation Misuse
- UI-DBP-030 - Forbidden Variables Usage In Selectors
- UI-PRR-001 - Simulate Click
- UI-PRR-002 - Simulate Type
- UI-PRR-003 - Open Application Misuse
- UI-PRR-004 - Hardcoded Delays
- UI-REL-001 - Large Idx in Selectors
- UI-SEC-004 - Selector Email Data
- UI-SEC-010 - App/Url Restrictions
- UI-USG-011 - Non Allowed Attributes
- UX-SEC-010 - App/Url Restrictions
- UX-DBP-029 - Insecure Password Use
- UI-PST-001 - Audit Log Level in Project Settings
- UiPath Browser Migration Tool
- Clipping region
- Computer Vision Recorder
- Activities index
- Activate
- Anchor Base
- Attach Browser
- Attach Window
- Block User Input
- Callout
- Check
- Click
- Click Image
- Click Image Trigger
- Click OCR Text
- Click Text
- Click Trigger
- Close Application
- Close Tab
- Close Window
- Context Aware Anchor
- Copy Selected Text
- Element Attribute Change Trigger
- Element Exists
- Element Scope
- Element State Change Trigger
- Export UI Tree
- Extract Structured Data
- Find Children
- Find Element
- Find Image
- Find Image Matches
- Find OCR Text Position
- Find Relative Element
- Find Text Position
- Get Active Window
- Get Ancestor
- Get Attribute
- Get Event Info
- Get From Clipboard
- Get Full Text
- Get OCR Text
- Get Password
- Get Position
- Get Source Element
- Get Text
- Get Visible Text
- Go Back
- Go Forward
- Go Home
- Google Cloud Vision OCR
- Hide Window
- Highlight
- Hotkey Trigger
- Hover
- Hover Image
- Hover OCR Text
- Hover Text
- Image Exists
- Indicate On Screen
- Inject .NET Code
- Inject Js Script
- Invoke ActiveX Method
- Key Press Trigger
- Load Image
- Maximize Window
- Microsoft Azure Computer Vision OCR
- Microsoft OCR
- Microsoft Project Oxford Online OCR
- Minimize Window
- Monitor Events
- Mouse Trigger
- Move Window
- Navigate To
- OCR Text Exists
- On Element Appear
- On Element Vanish
- On Image Appear
- On Image Vanish
- Open Application
- Open Browser
- Refresh Browser
- Replay User Event
- Restore Window
- Save Image
- Select Item
- Select Multiple Items
- Send Hotkey
- Set Clipping Region
- Set Focus
- Set Text
- Set To Clipboard
- Set Web Attribute
- Show Window
- Start Process
- System Trigger
- Take Screenshot
- Tesseract OCR
- Text Exists
- Tooltip
- Type Into
- Type Secure Text
- Use Foreground
- Wait Attribute
- Wait Element Vanish
- Wait Image Vanish
- Application Event Trigger
- Check/Uncheck
- Check App State
- Check Element
- Click
- Click Event Trigger
- Drag and Drop
- Extract Table Data
- For Each UI Element
- Get Attribute
- Get Browser Data
- Get Text
- Get URL
- Go to URL
- Highlight
- Hover
- Inject Js Script
- Keyboard Shortcuts
- Keypress Event Trigger
- Mouse Scroll
- Navigate Browser
- Select Item
- Set Browser Data
- Set Runtime Browser
- Set Text
- Take Screenshot
- Type Into
- Use Application/Browser
- Perform browser search and retrieve results using UI Automation APIs
- Web Browsing
- Find Images
- Click Images
- Trigger and Monitor Events
- Create and Override Files
- HTML Pages: Extract and Manipulate Information
- Window Manipulation
- Automated List Selection
- Find and Manipulate Window Elements
- Manage Text Automation
- Load and Process Images
- Manage Mouse Activated Actions
- Automate Application Runtime
- Automated Run of a Local Application
- Browser Navigation
- Web Automation
- Trigger Scope Example
- Enable UI Automation support in DevExpress
- Computer Vision Local Server
- Mobile Automation
- Release notes
- Project compatibility
- Get Log Types
- Get Logs
- Get Page Source
- Get Device Orientation
- Get Session Identifier
- Install App
- Manage Current App
- Manage Other App
- Open DeepLink
- Open URL
- Mobile Device Connection
- Directional Swipe
- Draw Pattern
- Positional Swipe
- Press Hardware Button
- Set Device Orientation
- Take Screenshot
- Take Screenshot Part
- Element Exists
- Execute Command
- Get Attribute
- Get Selected Item
- Get Text
- Set Selected Item
- Set Text
- Swipe
- Tap
- Type Text
- Terminal
UI Automation Activities
UI-based automation profiling data collection
UiPath values data privacy and aims towards protecting all users' right to privacy when sharing data while using the UiPath UI Automation functionality.
UiPath ensures the security and privacy of data through a comprehensive approach that includes compliance with global data protection regulations like GDPR, ensuring legal standards in data handling are met. The platform employs data encryption for both data in transit and at rest, safeguarding against unauthorized access. Additionally, robust access control mechanisms, such as Role-based Access Control (RBAC), restrict system and data access to authorized users only, enhancing data security.
The platform also adheres to secure development practices, which minimizes the risk of software vulnerabilities. Regular security audits and updates help in keeping the platform resilient against emerging threats. Furthermore, strong user authentication and authorization processes are in place to prevent unauthorized system access. In the event of a security breach, UiPath is equipped with an incident response plan to effectively mitigate potential impacts on data security and privacy.
For the UI Automation activities, the job profiling data collection is performed during unattended runs of the automation, initiated from the Orchestrator. This includes activity properties runtime values, the execution duration, and application screenshots taken during execution. This means that during the execution of unattended automations, screenshots of your environment are captured. The capture is meant to focus on system processes, actions, and responses.
The primary objective of our data processing is to improve the UI-based automation's reliability in the context of your unique user experience. This approach helps us better understand your particular needs and the goal is to ultimately enable us to build output that matches your expectations in a given context.
The data we collect is only for internal use and will only be provided to UiPath sub-processors supporting with data processing activities, as necessary. Access to this data within the organization is limited to authorized personnel who are part of the product development team.
We remind you that you should not use any sensitive data such as personal data or confidential data when using our Community services.
Our hosting locations are in the EU and USA.
We implement stringent security measures to ensure the data's safety, such as:
- Use of TLS 1.2 encrypted protocol for data transfer.
- Secure storage with access controls. Azure encryption mechanisms for Storage Account and Data Lake Gen2 are leveraged by design. In Azure Storage, data is encrypted and decrypted transparently using 256-bit AES encryption algorithm.
- Periodical data audits to ensure there's no breach or misuse. Storage access is strictly regulated through Role-based Access Control (RBAC) and Privileged Identity Management (PIM). Elevation is only permitted to those individuals who have been granted this right.