AI agents generate, read, and write large amounts of data continuously — memory files, embeddings, model caches, and session logs. Without proper antivirus exclusions, your system's real-time scanner treats every file operation as a potential threat, causing severe performance degradation and sometimes false-positive quarantines of legitimate UAML data.
UAML's Antivirus Exclusion Manager solves this by configuring precisely scoped exclusions for your UAML data directories. The exclusions cover only what's necessary — no more, no less — keeping your system protected while eliminating unnecessary scanning overhead.
Supported Platforms
🪟 Windows Defender
Configures Windows Defender exclusions via PowerShell. Adds UAML data directories, SQLite database files, and the embedding cache to the exclusion list. Supports both path-based and process-based exclusions for the UAML runtime.
🍎 macOS XProtect
Manages XProtect and Gatekeeper settings for UAML binaries and data directories. Ensures UAML processes aren't interrupted by real-time malware scanning during intensive memory operations like bulk imports or vector index rebuilds.
🐧 ClamAV
Generates ClamAV exclusion patterns for on-access scanning (clamonacc). Adds UAML directories to the exclusion list in clamd.conf. Supports both system-wide and per-user ClamAV configurations.
Minimal Scope Principle
Security exclusions are a trade-off: too broad and you weaken your protection, too narrow and you still get performance hits. UAML applies the minimal scope principle — only the specific directories that UAML actively uses are excluded from real-time scanning.
Excluded paths typically include the UAML data directory (SQLite databases, memory files), the embedding vector cache, and temporary processing directories. User documents, downloads, and other system directories remain fully protected. The exclusion list is generated dynamically based on your actual UAML configuration, so it's always accurate.
Performance Impact
On systems with real-time antivirus scanning, UAML memory operations can be 3–10× slower without proper exclusions. Every file read, write, and SQLite transaction triggers a scan. For agents processing hundreds of memory operations per minute, this overhead is significant.
After applying UAML-specific exclusions, performance returns to native speeds. The Security Configurator measures the before/after impact and shows you the exact improvement, so you can verify the exclusions are working correctly.
One-Click Setup
The entire exclusion configuration is a single click in the UAML Web UI. The system detects your antivirus software, generates the appropriate exclusion rules, shows you a preview of what will be changed, and applies the configuration after your confirmation. No manual registry edits, no config file hunting, no CLI commands to remember.
Why It Matters
- Performance — eliminate 3–10× slowdown from unnecessary real-time scanning
- Stability — prevent false-positive quarantine of UAML data files
- Minimal scope — only UAML directories are excluded, everything else stays protected
- Cross-platform — Windows Defender, XProtect, and ClamAV supported
- Reversible — remove all exclusions with one click if needed