- Release notes
- Getting started
- Installation
- Configuration
- Integrations
- Authentication
- Working with Apps and Discovery Accelerators
- AppOne menus and dashboards
- AppOne setup
- TemplateOne 1.0.0 menus and dashboards
- TemplateOne 1.0.0 setup
- TemplateOne menus and dashboards
- TemplateOne 2021.4.0 setup
- Purchase to Pay Discovery Accelerator menus and dashboards
- Purchase to Pay Discovery Accelerator Setup
- Order to Cash Discovery Accelerator menus and dashboards
- Order to Cash Discovery Accelerator Setup
- Basic Connector for AppOne
- SAP Connectors
- Introduction to SAP Connector
- SAP input
- Checking the data in the SAP Connector
- Adding process specific tags to the SAP Connector for AppOne
- Adding process specific Due dates to the SAP Connector for AppOne
- Adding automation estimates to the SAP Connector for AppOne
- Adding attributes to the SAP Connector for AppOne
- Adding activities to the SAP Connector for AppOne
- Adding entities to the SAP Connector for AppOne
- SAP Order to Cash Connector for AppOne
- SAP Purchase to Pay Connector for AppOne
- SAP Connector for Purchase to Pay Discovery Accelerator
- SAP Connector for Order-to-Cash Discovery Accelerator
- Superadmin
- Dashboards and charts
- Tables and table items
- Application integrity
- How to ....
- Working with SQL connectors
- Introduction to SQL connectors
- Setting up a SQL connector
- CData Sync extractions
- Running a SQL connector
- Editing transformations
- Releasing a SQL Connector
- Scheduling data extraction
- Structure of transformations
- Using SQL connectors for released apps
- Generating a cache with scripts
- Setting up a local test environment
- Separate development and production environments
- Useful resources
Process Mining
Set up Audit Logs
For reasons of compliance, it may be needed to have an audit trail. UiPath Process Mining enables you to create audit trails by means of the Audit Logs functionality. Audit Logs record events in chronological order.
This guide describes:
- The categories for log entries;
- How to set up Audit Logs;
- Exporting the audit logs.
Every entry in the audit log contains:
- a version number,
- a timestamp,
- the identification number of the UiPath Process Mining instance that logged the entry,
- session information,
- a log entry.
The following table describes the elements of the session information.
Element |
Description |
---|---|
|
The IP address of the system from which the action was triggered. |
|
Indicates whether the user is a Superadmin user. |
|
Indicates whether the action was taken as the Data Server. |
|
The ID of the user. |
|
The ID of the user’s organization. |
|
The impersonated User ID of the Superadmin user. Note: Only applicable if
isSuperAdmin is True.
|
The audit log distinguishes the following categories for log entries.
- User authentication, for example logins,
- User management actions, for example add/remove users and change password.
- Releases, creation, deletion, activation, etc.,
- Data accesses, for example project viewed with datasets, delete dataset, upload data, upload/change files, refresh/load, etc.,
- Data exports by the end user,
- Changes to server settings,
- Changes to the license information,
- Errors related to data leaks.
The categories are described in more detail in Category Details.
By default, Audit Logs functionality is disabled. To enable the Audit Logs you must create the folder in which the log files will be stored.
Follow these steps to create a new folder for the Audit Logs and to display the security settings for the folder.
Step |
Action |
---|---|
1 |
Go to your UiPath Process Mining installation folder <PLATFORMDIR>. |
2 |
Create a new folder and rename it to auditlogs. |
3 |
The inherited access rights of the auditlogs folder are displayed. |
Since Audit Logs are used for compliance and security strict access rules must be applied to the auditlogs folder, its subfolders and files.
- Set the access rights for the folder, subfolders and files for the platform accounts.
- Set up read-only access for auditors who are allowed to read the audit logs.
- Disable inherited permission.
Access rights for the accounts running the platform
Audit logs are written using the user account for the Application Pool. The user account needs write access to the folder, its subfolders, and files to be able to add log files and log entries.
IIS_IUSRS
and SYSTEM
accounts.
The steps below must be performed for all accounts running the platform. In a default situation, this will be:
IIS_IUSRS
SYSTEM
If there are other accounts that run the platform, for example to automatically generate caches, these steps must be performed as well.
In the steps below, these accounts are referred to as ‘account’.
Follow these steps to set the access rights for the auditlogs folder.
Step |
Action |
---|---|
1 |
Click on Addin the Advanced Security Settings dialog. |
2 |
Click on Select a principal. |
3 |
Select the account and click on OK. |
4 |
Select This folder only in the Applies to list. |
5 |
Click on Show advanced permissions. |
6 |
Click on Clear all. |
7 |
Enable Create folders/append data and click on OK. |
IIS_IUSRS
, then you must also enable List folder / read data.
Follow these steps to set the access rights for the subfolders and files in the auditlogs folder.
Step |
Action |
---|---|
1 |
Click on Add in the Advanced Security Settings dialog. |
2 |
Click on Select a principal. |
3 |
Select the account and click on OK. |
4 |
Select Subfolders and files only in the Applies to list. |
5 |
Click on Show advanced permissions. |
6 |
Click on Clear all. |
7 |
Enable Create files/write data and click on OK. |
Access rights for auditors
<PLATFORMDIR>\auditlogs
folder.
Follow these steps to set up read-only access for users who are allowed to read the audit log files.
Step |
Action |
---|---|
1 |
Click on Add in the Advanced Security Settings dialog. |
2 |
Click on Select a principal. |
3 |
Select the user who you want to give read-only access and click on OK. Note: You must select a user. This does not work for groups.
|
4 |
Select This folder, subfolders and files in the Applies to list. |
5 |
Enable Read & Execute,List folder contents, and Read. |
6 |
Click on OK. |
Disable inherited permissions
Follow these steps to disable inheritance and to complete the set up for the Audit Logs.
Step |
Action |
---|---|
1 |
Click on Disable inheritance in the Advanced Security Settings dialog. |
2 |
Click on OK to save all the access right settings and to close the Advanced Security Settings. |
3 |
Close the Properties dialog. |
Dataserver - ExportAuditLogs
function. Use the out= parameter
to specify the name and location of the export file.
ExportAuditLogs
function merges individual logs into a single .csv file without regard for the order of the events.
Follow these steps to export the audit logs.
Step |
Action |
---|---|
1 |
Open a Windows Command Prompt dialog. |
2 |
Navigate to the
<PLATFORMDIR> folder.
|
3 |
Enter the following command: builds\processgold.bat -DataServer -ExportAuditlogs
out=auditlogs\auditlogs.csv .
|
auditlogs.csv
is created in the auditlogs folder.
Dataserver – ExportAuditLogs
function.
builds\processgold.bat -DataServer -? ExportAuditLogs