- Introduction
- Setting up your account
- Balance
- Clusters
- Concept drift
- Coverage
- Datasets
- General fields
- Labels (predictions, confidence levels, label hierarchy, and label sentiment)
- Models
- Streams
- Model Rating
- Projects
- Precision
- Recall
- Annotated and unannotated messages
- Extraction Fields
- Sources
- Taxonomies
- Training
- True and false positive and negative predictions
- Validation
- Messages
- Access Control and Administration
- Manage sources and datasets
- Understanding the data structure and permissions
- Creating or deleting a data source in the GUI
- Uploading a CSV file into a source
- Preparing data for .CSV upload
- Creating a dataset
- Multilingual sources and datasets
- Enabling sentiment on a dataset
- Amending dataset settings
- Deleting a message
- Deleting a dataset
- Exporting a dataset
- Using Exchange integrations
- Model training and maintenance
- Understanding labels, general fields, and metadata
- Label hierarchy and best practices
- Comparing analytics and automation use cases
- Turning your objectives into labels
- Overview of the model training process
- Generative Annotation
- Dastaset status
- Model training and annotating best practice
- Training with label sentiment analysis enabled
- Training chat and calls data
- Understanding data requirements
- Train
- Introduction to Refine
- Precision and recall explained
- Precision and Recall
- How validation works
- Understanding and improving model performance
- Reasons for label low average precision
- Training using Check label and Missed label
- Training using Teach label (Refine)
- Training using Search (Refine)
- Understanding and increasing coverage
- Improving Balance and using Rebalance
- When to stop training your model
- Using general fields
- Generative extraction
- Using analytics and monitoring
- Automations and Communications Mining™
- Developer
- Exchange Integration with Azure service user
- Exchange Integration with Azure Application Authentication
- Exchange Integration with Azure Application Authentication and Graph
- Fetching data for Tableau with Python
- Elasticsearch integration
- Self-hosted Exchange integration
- UiPath® Automation Framework
- UiPath® Marketplace activities
- UiPath® official activities
- How machines learn to understand words: a guide to embeddings in NLP
- Prompt-based learning with Transformers
- Efficient Transformers II: knowledge distillation & fine-tuning
- Efficient Transformers I: attention mechanisms
- Deep hierarchical unsupervised intent modelling: getting value without training data
- Fixing annotating bias with Communications Mining™
- Active learning: better ML models in less time
- It's all in the numbers - assessing model performance with metrics
- Why model validation is important
- Comparing Communications Mining™ and Google AutoML for conversational data intelligence
- Licensing
- FAQs and more

Communications Mining user guide
Access and user management
If you are accessing the platform via Legacy access:
To get an account, an Administrator will need to create a new user profile from the Manage Access tab in the Admin console, accessible through the gear icon.
Once a new account has been requested you should automatically receive an email requesting you to setup your account.
If you are accessing the platform via Automation Cloud:
To get an account, an Administrator on your Automation Cloud will need to add you to the tenant the Communications Mining service is enabled on.
Once you are added to the tenant, an Administrator on Communications Mining will need to add you to the relevant projects.
Each time you log into Communications Mining, you will need to do so via Automation Cloud, via the SSO.
With the right permissions, you can easily add new users via the Manage Access page. For a guided walkthrough of how to do this, check Creating a new user (non-Automation Cloud admins).
When a new user is created or added to an project, they are granted certain default permissions. Permissions allow users access to certain actions and features within the platform. Permissions can be granted by a single user to other users, as long as they have said permissions.
To view the full list of permissions and the actions they allow, check Roles and their underlying permissions. For more details on updating the user permissions, check Managing user and group roles.
You will need to install the Google Authenticator application onto your mobile device to set up two-actor authentication (2FA). This can be downloaded from the Apple App Store or Google Play.
For more details on how to install and use Google Authenticator, check the official Google documentation.
-
If you are using an iPhone, go to Settings, and select General, then Date & Time. Make sure that Set Automatically is enabled, and then try your 2FA again.
-
If you are using an Android phone, go to Settings, and select Date & Time. Make sure that Automatic Time Zone Setting is enabled.
If your problem persists, submit a UiPath® Support ticket.