SlideShare a Scribd company logo
1 of 13
By
Suhruth Dantu
Software engineer- Robotics
FALLOUT MANAGEMENT
&
LOG MECANISM
Data Compliance Architecture
Log Mechanism Fallout Management
 Global
Process
Tracking
 The Benefits
of Logging
Configuration
 Built-in
Compliance
Measures
 Visual Logs
 Summary
 Genuine
 Genuine
Fallouts.
 Exceptions.
 Resolution.
Global Process Tracking
Enterprise-level RPA tools set logging actions at a global level, which means that every possible action in the
automation can be tracked and time-stamped when the feature is activated. Typically, RPA robots record all
activity on a step-by-step basis and store it in a session log. This global process tracking provides a fully
operational audit trail, but the detailed action logs can also be used to extract actionable analytics, to be
displayed in a centralized control panel. Thus, with comprehensive governance measures, your business can
ensure security compliance while bolstering efficiency.
Log Mechanism
In security, activity logging concerns the reporting and auditing of RPA
processes. This feature is essential to tracking data compliance and
reinforcing security measures. Logging also provides detailed
information that can be used to improve process efficiency.
 Transaction Logs.
 Audit Logs.
 Error Logs.
Transaction Logs
• Transaction logs are used for tracking the status of the bot and the
time taken by the bot to complete the operations process.
Sl.no XXX ID Start Time End Time Status Remark
1 22xxxxx66xxxx 14:31:15 14:38:16 Successful Completed
1 22xxxxx67xxxx 14:38:25 14:40:16 Manual Fallout Reason
Audit Logs
The Audit Logs are used for Research and Analysis when an unknown Error Occurs.
Audit Log:
==================================================================================================
Task Name: XXXXXXXX.
Open X Application: X Application opened successfully.
Perform Click on __ Button: Click was performed successfully.
Open Spreadsheet: Spreadsheet opened successfully.
Run Macro: Macro ran successfully.
Status: Success or Fallout or Error.
Date: XX/YY/ZZZZ.
Time: xx:yy:zz.
Error Logs
Error logs are used while debugging the code and at the time of research on
why error occurred.
Text and Image can be logged in this.
===============================================================================
Error linenumber: XX
Error Description: xxxxxxxxxxxxxxxxxx.
Taskname: xxxxxxxxxxxxxxxxxxx.
Date:11/01/2017 17:41:45.
=================================================================================
Visual Logs.
• Another audit control mechanism are the less-common visual logs.
Unlike the typical text data stored in activity logs, visual logs are a
series of screenshots that are created for each action in an
automation during the recording phase. While they provide a handy
reference image as to what each action is intended to perform, they
are most commonly used to for auditing and debugging purposes.
• Visual logs can be very helpful when looking to debug an issue caused
by a difference within a target system that has not been captured or
introduced by an update. The use of visual logs needs to be thought
about carefully due to the information that can inadvertently be
captured within them (customer personal data for example).
The Benefits of Logging Configuration
To fit your business needs, log messages can often be configured in
terms of the information they convey. For example, log message
configuration can help administrators filter metrics based on
relevance and data governance standards. This enables your business
to streamline the review process for especially complex automations.
Custom configuration can also allow your business to format log data
(in terms of file type and structure) to be leveraged with business
auditing and intelligence tools. Populating relevant data into your
incumbent intelligence tool and team is helpful in long term
understanding of RPA impact and seeing trends.
Built-in Compliance Measures
One reason to look for robust logging within enterprise-level RPA tools
is that the functionality can be utilized to assist with process
compliance. With human teams, businesses set up a process and
attempt to ensure the compliance of documented steps. However, it is
impractical to expect teams to always follow exact documentation,
making it hard to validate compliance. Once a RPA process is built it
will always follow the exact same steps (always compliant), along with
providing the logged steps to prove that the developed steps have
always been followed.
Fallout Mechanism.
Genuine fallouts:
The fallouts which needs Manual Intervention i.e. which cannot be
processed by bots are known as Genuine Fallouts.
Exceptions:
Exception is a scenario where Bot throws an error due to system issues
Like System Response, Server response , Application Behavior etc.
Resolution & Summary.
In terms of security and optimization, logging is one of the most powerful features in RPA. Global
process tracking ensures that all actions in the automation are accountable and auditable.
Meanwhile, features like logging configuration enable businesses to fit logged data to their
standards. In fact, the top RPA tools are built with enterprise data needs in mind, providing a wide
variety of data governance standards.
Thank
You

More Related Content

What's hot

Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computingSohailAliMalik
 
Performance tuning and optimization (ppt)
Performance tuning and optimization (ppt)Performance tuning and optimization (ppt)
Performance tuning and optimization (ppt)Harish Chand
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 
24. Advanced Transaction Processing in DBMS
24. Advanced Transaction Processing in DBMS24. Advanced Transaction Processing in DBMS
24. Advanced Transaction Processing in DBMSkoolkampus
 
15. Transactions in DBMS
15. Transactions in DBMS15. Transactions in DBMS
15. Transactions in DBMSkoolkampus
 
What, Why and How of Governance in RPA
What, Why and How of Governance  in RPAWhat, Why and How of Governance  in RPA
What, Why and How of Governance in RPAMohit Sharma (GAICD)
 
Data Processing in Fundamentals of IT
Data Processing in Fundamentals of ITData Processing in Fundamentals of IT
Data Processing in Fundamentals of ITSanthiNivas
 
AI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
AI & Robotic Process Automation (RPA) to Digitally Transform Your EnvironmentAI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
AI & Robotic Process Automation (RPA) to Digitally Transform Your EnvironmentCprime
 
High Availability Infrastructure for Cloud Computing
High Availability Infrastructure for Cloud ComputingHigh Availability Infrastructure for Cloud Computing
High Availability Infrastructure for Cloud ComputingBob Rhubart
 
Capgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate FunctionsCapgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate FunctionsUiPath
 
It infrastructure hardware and software
It infrastructure hardware and softwareIt infrastructure hardware and software
It infrastructure hardware and softwareProf. Othman Alsalloum
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docxkumari36
 
Business Process Automation A Productivity Lever
Business Process Automation A Productivity LeverBusiness Process Automation A Productivity Lever
Business Process Automation A Productivity LeverKnoldus Inc.
 
RPA Portfolio Assessment
RPA Portfolio Assessment RPA Portfolio Assessment
RPA Portfolio Assessment Eric Rodman
 

What's hot (20)

Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
Performance tuning and optimization (ppt)
Performance tuning and optimization (ppt)Performance tuning and optimization (ppt)
Performance tuning and optimization (ppt)
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 
24. Advanced Transaction Processing in DBMS
24. Advanced Transaction Processing in DBMS24. Advanced Transaction Processing in DBMS
24. Advanced Transaction Processing in DBMS
 
2022.06 Community Update.pdf
2022.06 Community Update.pdf2022.06 Community Update.pdf
2022.06 Community Update.pdf
 
Platform as a Service (PaaS)
Platform as a Service (PaaS)Platform as a Service (PaaS)
Platform as a Service (PaaS)
 
Executive support system
Executive support systemExecutive support system
Executive support system
 
TYBSC CS SEM 5 AI NOTES
TYBSC CS SEM 5 AI NOTESTYBSC CS SEM 5 AI NOTES
TYBSC CS SEM 5 AI NOTES
 
Temporal database
Temporal databaseTemporal database
Temporal database
 
15. Transactions in DBMS
15. Transactions in DBMS15. Transactions in DBMS
15. Transactions in DBMS
 
What, Why and How of Governance in RPA
What, Why and How of Governance  in RPAWhat, Why and How of Governance  in RPA
What, Why and How of Governance in RPA
 
Data Processing in Fundamentals of IT
Data Processing in Fundamentals of ITData Processing in Fundamentals of IT
Data Processing in Fundamentals of IT
 
AI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
AI & Robotic Process Automation (RPA) to Digitally Transform Your EnvironmentAI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
AI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
 
High Availability Infrastructure for Cloud Computing
High Availability Infrastructure for Cloud ComputingHigh Availability Infrastructure for Cloud Computing
High Availability Infrastructure for Cloud Computing
 
Capgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate FunctionsCapgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate Functions
 
It infrastructure hardware and software
It infrastructure hardware and softwareIt infrastructure hardware and software
It infrastructure hardware and software
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
 
Business Process Automation A Productivity Lever
Business Process Automation A Productivity LeverBusiness Process Automation A Productivity Lever
Business Process Automation A Productivity Lever
 
UiPath Extensions_v3.pdf
UiPath Extensions_v3.pdfUiPath Extensions_v3.pdf
UiPath Extensions_v3.pdf
 
RPA Portfolio Assessment
RPA Portfolio Assessment RPA Portfolio Assessment
RPA Portfolio Assessment
 

Similar to Rpa fallout and log mechanism

Blue Prism_White Paper_ Technical Kickstarter
Blue Prism_White Paper_ Technical KickstarterBlue Prism_White Paper_ Technical Kickstarter
Blue Prism_White Paper_ Technical KickstarterKeith Bowman
 
Practical operability techniques for teams - Matthew Skelton - Agile in the C...
Practical operability techniques for teams - Matthew Skelton - Agile in the C...Practical operability techniques for teams - Matthew Skelton - Agile in the C...
Practical operability techniques for teams - Matthew Skelton - Agile in the C...Skelton Thatcher Consulting Ltd
 
Robotic Process Automation with UiPath Studio
Robotic Process Automation with UiPath StudioRobotic Process Automation with UiPath Studio
Robotic Process Automation with UiPath StudioLalit Birla
 
UI_Path_First_Intro.pptx
UI_Path_First_Intro.pptxUI_Path_First_Intro.pptx
UI_Path_First_Intro.pptxharrytharun1
 
Cicero Discovery White Paper
Cicero Discovery White PaperCicero Discovery White Paper
Cicero Discovery White PaperCicero, Inc.
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstractsncct
 
Chapter 4 computer enabled project topic.pptx To familiarise Computer applica...
Chapter 4 computer enabled project topic.pptx To familiarise Computer applica...Chapter 4 computer enabled project topic.pptx To familiarise Computer applica...
Chapter 4 computer enabled project topic.pptx To familiarise Computer applica...anamikaghosh21
 
Dot Net performance monitoring
 Dot Net performance monitoring Dot Net performance monitoring
Dot Net performance monitoringKranthi Paidi
 
SOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataSOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataKashish Trivedi
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
On Going Web
On Going WebOn Going Web
On Going Webmigodalin
 
Business Analyst Series 2023 - Week 3 Session 5
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5DianaGray10
 
]project-open[ Roll Out Plan
]project-open[ Roll Out Plan]project-open[ Roll Out Plan
]project-open[ Roll Out PlanKlaus Hofeditz
 
20 Windows Tools Every SysAdmin Should Know
20 Windows Tools Every SysAdmin Should Know20 Windows Tools Every SysAdmin Should Know
20 Windows Tools Every SysAdmin Should KnowPower Admin LLC
 
Prometheus for Monitoring Metrics (Percona Live Europe 2017)
Prometheus for Monitoring Metrics (Percona Live Europe 2017)Prometheus for Monitoring Metrics (Percona Live Europe 2017)
Prometheus for Monitoring Metrics (Percona Live Europe 2017)Brian Brazil
 
20 Simple Questions from Exactpro for Your Enjoyment This Holiday Season
20 Simple Questions from Exactpro for Your Enjoyment This Holiday Season20 Simple Questions from Exactpro for Your Enjoyment This Holiday Season
20 Simple Questions from Exactpro for Your Enjoyment This Holiday SeasonIosif Itkin
 
Ui path certificate question set 1
Ui path certificate question set 1Ui path certificate question set 1
Ui path certificate question set 1Majid Hashmi
 
Monitoring of computers
Monitoring of computers Monitoring of computers
Monitoring of computers carlosrudy_45
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET Journal
 

Similar to Rpa fallout and log mechanism (20)

Blue Prism_White Paper_ Technical Kickstarter
Blue Prism_White Paper_ Technical KickstarterBlue Prism_White Paper_ Technical Kickstarter
Blue Prism_White Paper_ Technical Kickstarter
 
Practical operability techniques for teams - Matthew Skelton - Agile in the C...
Practical operability techniques for teams - Matthew Skelton - Agile in the C...Practical operability techniques for teams - Matthew Skelton - Agile in the C...
Practical operability techniques for teams - Matthew Skelton - Agile in the C...
 
Robotic Process Automation with UiPath Studio
Robotic Process Automation with UiPath StudioRobotic Process Automation with UiPath Studio
Robotic Process Automation with UiPath Studio
 
UI_Path_First_Intro.pptx
UI_Path_First_Intro.pptxUI_Path_First_Intro.pptx
UI_Path_First_Intro.pptx
 
Cicero Discovery White Paper
Cicero Discovery White PaperCicero Discovery White Paper
Cicero Discovery White Paper
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
 
Chapter 4 computer enabled project topic.pptx To familiarise Computer applica...
Chapter 4 computer enabled project topic.pptx To familiarise Computer applica...Chapter 4 computer enabled project topic.pptx To familiarise Computer applica...
Chapter 4 computer enabled project topic.pptx To familiarise Computer applica...
 
Dot Net performance monitoring
 Dot Net performance monitoring Dot Net performance monitoring
Dot Net performance monitoring
 
SOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataSOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp Drata
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
On Going Web
On Going WebOn Going Web
On Going Web
 
Business Analyst Series 2023 - Week 3 Session 5
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
 
]project-open[ Roll Out Plan
]project-open[ Roll Out Plan]project-open[ Roll Out Plan
]project-open[ Roll Out Plan
 
Performance testing wreaking balls
Performance testing wreaking ballsPerformance testing wreaking balls
Performance testing wreaking balls
 
20 Windows Tools Every SysAdmin Should Know
20 Windows Tools Every SysAdmin Should Know20 Windows Tools Every SysAdmin Should Know
20 Windows Tools Every SysAdmin Should Know
 
Prometheus for Monitoring Metrics (Percona Live Europe 2017)
Prometheus for Monitoring Metrics (Percona Live Europe 2017)Prometheus for Monitoring Metrics (Percona Live Europe 2017)
Prometheus for Monitoring Metrics (Percona Live Europe 2017)
 
20 Simple Questions from Exactpro for Your Enjoyment This Holiday Season
20 Simple Questions from Exactpro for Your Enjoyment This Holiday Season20 Simple Questions from Exactpro for Your Enjoyment This Holiday Season
20 Simple Questions from Exactpro for Your Enjoyment This Holiday Season
 
Ui path certificate question set 1
Ui path certificate question set 1Ui path certificate question set 1
Ui path certificate question set 1
 
Monitoring of computers
Monitoring of computers Monitoring of computers
Monitoring of computers
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Rpa fallout and log mechanism

  • 1. By Suhruth Dantu Software engineer- Robotics FALLOUT MANAGEMENT & LOG MECANISM
  • 2. Data Compliance Architecture Log Mechanism Fallout Management  Global Process Tracking  The Benefits of Logging Configuration  Built-in Compliance Measures  Visual Logs  Summary  Genuine  Genuine Fallouts.  Exceptions.  Resolution.
  • 3. Global Process Tracking Enterprise-level RPA tools set logging actions at a global level, which means that every possible action in the automation can be tracked and time-stamped when the feature is activated. Typically, RPA robots record all activity on a step-by-step basis and store it in a session log. This global process tracking provides a fully operational audit trail, but the detailed action logs can also be used to extract actionable analytics, to be displayed in a centralized control panel. Thus, with comprehensive governance measures, your business can ensure security compliance while bolstering efficiency.
  • 4. Log Mechanism In security, activity logging concerns the reporting and auditing of RPA processes. This feature is essential to tracking data compliance and reinforcing security measures. Logging also provides detailed information that can be used to improve process efficiency.  Transaction Logs.  Audit Logs.  Error Logs.
  • 5. Transaction Logs • Transaction logs are used for tracking the status of the bot and the time taken by the bot to complete the operations process. Sl.no XXX ID Start Time End Time Status Remark 1 22xxxxx66xxxx 14:31:15 14:38:16 Successful Completed 1 22xxxxx67xxxx 14:38:25 14:40:16 Manual Fallout Reason
  • 6. Audit Logs The Audit Logs are used for Research and Analysis when an unknown Error Occurs. Audit Log: ================================================================================================== Task Name: XXXXXXXX. Open X Application: X Application opened successfully. Perform Click on __ Button: Click was performed successfully. Open Spreadsheet: Spreadsheet opened successfully. Run Macro: Macro ran successfully. Status: Success or Fallout or Error. Date: XX/YY/ZZZZ. Time: xx:yy:zz.
  • 7. Error Logs Error logs are used while debugging the code and at the time of research on why error occurred. Text and Image can be logged in this. =============================================================================== Error linenumber: XX Error Description: xxxxxxxxxxxxxxxxxx. Taskname: xxxxxxxxxxxxxxxxxxx. Date:11/01/2017 17:41:45. =================================================================================
  • 8. Visual Logs. • Another audit control mechanism are the less-common visual logs. Unlike the typical text data stored in activity logs, visual logs are a series of screenshots that are created for each action in an automation during the recording phase. While they provide a handy reference image as to what each action is intended to perform, they are most commonly used to for auditing and debugging purposes. • Visual logs can be very helpful when looking to debug an issue caused by a difference within a target system that has not been captured or introduced by an update. The use of visual logs needs to be thought about carefully due to the information that can inadvertently be captured within them (customer personal data for example).
  • 9. The Benefits of Logging Configuration To fit your business needs, log messages can often be configured in terms of the information they convey. For example, log message configuration can help administrators filter metrics based on relevance and data governance standards. This enables your business to streamline the review process for especially complex automations. Custom configuration can also allow your business to format log data (in terms of file type and structure) to be leveraged with business auditing and intelligence tools. Populating relevant data into your incumbent intelligence tool and team is helpful in long term understanding of RPA impact and seeing trends.
  • 10. Built-in Compliance Measures One reason to look for robust logging within enterprise-level RPA tools is that the functionality can be utilized to assist with process compliance. With human teams, businesses set up a process and attempt to ensure the compliance of documented steps. However, it is impractical to expect teams to always follow exact documentation, making it hard to validate compliance. Once a RPA process is built it will always follow the exact same steps (always compliant), along with providing the logged steps to prove that the developed steps have always been followed.
  • 11. Fallout Mechanism. Genuine fallouts: The fallouts which needs Manual Intervention i.e. which cannot be processed by bots are known as Genuine Fallouts. Exceptions: Exception is a scenario where Bot throws an error due to system issues Like System Response, Server response , Application Behavior etc.
  • 12. Resolution & Summary. In terms of security and optimization, logging is one of the most powerful features in RPA. Global process tracking ensures that all actions in the automation are accountable and auditable. Meanwhile, features like logging configuration enable businesses to fit logged data to their standards. In fact, the top RPA tools are built with enterprise data needs in mind, providing a wide variety of data governance standards.