Skip to main content
Skip to search
Library
Using This Site
Using this site
Search tips and operators
My Topics
Following topics
Save PDF options
Feedback
Request Demo
Login
English
English
Deutsch/German
Español (LatAm)/Spanish
Français/French
日本語/Japanese
한국어/Korean
Português (Brasil)/Portuguese
More Sites
A-People
Pathfinder Community
Corporate
Training
Partner Portal
Bot Store
Automation 360
Process Discovery
Download as PDF
Save selected topic
Save selected topic and subtopics
Save all topics
Share
Share to email
Copy topic URL
Contents
Expand
Collapse
Automation 360
Automation 360 FAQ
Automation 360 Cloud
Automation 360 Cloud FAQ
Automation 360 Cloud Service Status site
Automation 360 Cloud updates
Subscribing to notifications
Automation 360 architecture and resiliency
Control Room overview
Distributed architecture
Distributed architecture with HA/DR support
Security architecture
Security architecture model
Cloud operational responsibilities
Securing the RPA environment with external controls
Independent categories for Bot Creators and Bot Runners
RBAC in Control Room
RBAC on bots
RBAC on Bot Runners
RBAC for Credential Vault credentials management
Role-based processing domains
RBAC on Audit Log
RBAC on viewing bot activity
RBAC on User Management
RBAC on roles and permissions management
RBAC on bot schedules
RBAC on license management
Bot execution access by dynamic access token
Secure credential store through Credential Vault
Credential Vault encryption
Credential storage
Credential provisioning to bots
Secure recording
Authentication with Control Room
Supported authentication methods for On-Premises Control Room
Supported authentication methods for Automation 360 Cloud
Support for secure protocols
Network security overview
Change management
Identity and authentication
Password hashing
Secure authentication
Authentication for Bot Runners
Dynamic access token authentication of Bot Runners
Defenses against common vulnerabilities
Automation Anywhere Secure Software Development Lifecycle (SSDLC) policy
Customer support policy for external scanning and penetration testing
Cryptographic providers
Cryptographic ciphers
Additional security controls
General Data Protection Regulation compliance
Automation 360 software lifecycle policy
Data retention policy
Automation resiliency
Managing unexpected pop-ups
Configure pop-up handling
Record automation execution
Configure automation recording
Manage automation recording
Upcoming feature deprecations
Completed feature deprecations
Deprecation of Google Less Secure Apps (LSAs)
Google Less Secure Apps (LSAs) deprecation FAQ
Scan automations that use Email action for Gmail with Basic authentication
Scanning messages for automations using Gmail with basic authentication
Deprecation of EWS APIs in Exchange Online
EWS API deprecation FAQ
Scan bots that use email action with EWS option
Deprecation of Tesseract OCR v3
Chrome and Edge Manifest V3 extensions
Manifest V3 extensions FAQ
Manage multiple browser profiles for Manifest V3 extension
Deprecation of Basic authentication in Exchange Online
Automation 360 and Basic authentication deprecation FAQ
Scan bots for Basic authentication
Basic authentication scanning messages
Microsoft Internet Explorer EOL overview
Microsoft Internet Explorer 11 EOL FAQ
Scan Automation 360 bots for Internet Explorer usage
Analyze report for Internet Explorer bots
Update Bot wizard for converting IE bots
Viewing conversion details for Internet Explorer bots
Bot Scanner for EOL features
In-product user assistance
Features, licenses, and deployment
Platform licenses
Enterprise Platform
Automator AI Platform Base
Deployment models
Cloud licensing FAQ
GUID licensing model
Release Notes
Automation 360 Release Notes
Automation 360 v.36 Release Notes
AI Agent Studio v.36 release