🔧 Security Configurator

Enterprise-grade host security managed through a single interface. Firewall, antivirus, encryption, and audit — all in one place.

UAML's Security Configurator gives you centralized control over the security posture of every machine running your AI agents. From firewall rules to disk encryption, manage everything through a unified configuration layer.

Core Components

🧱 Firewall Management

Define and enforce firewall rules across all agent hosts. Whitelist only the ports and services your agents need. Automatic rule generation based on agent configuration — if your agent doesn't use network access, the firewall blocks it by default.

🛡️ Antivirus Integration

Integrates with system antivirus (Windows Defender, ClamAV) to scan memory imports and file attachments before they enter the memory store. Quarantine suspicious content automatically. Real-time protection without manual configuration.

🔐 BitLocker / LUKS Encryption

Enforce full-disk encryption on all agent hosts. UAML verifies encryption status at startup and can block operations if the host disk is unencrypted. Supports BitLocker (Windows) and LUKS (Linux) with status reporting.

Expert Mode

⚡ For Power Users

Expert Mode unlocks advanced security controls: custom firewall rule chains, certificate pinning for agent-to-agent communication, hardware security module (HSM) integration, and fine-grained permission policies. Disabled by default — requires explicit opt-in with acknowledgment.

Security Profiles

ProfileFirewallAV ScanningDisk EncryptionAudit Level
StandardEssential rulesOn importRecommendedBasic
HardenedStrict whitelistReal-timeRequiredFull
Air-GappedAll blockedReal-timeRequiredFull + integrity
ExpertCustom rulesCustomCustomCustom

Automated Audit Reports

from uaml.security import SecurityConfigurator config = SecurityConfigurator() # Check current security posture status = config.audit() print(status.score) # 92/100 print(status.warnings) # ["SSH key rotation overdue"] # Generate compliance report config.generate_report( format="pdf", standard="iso27001", period="2026-Q1", output="security-audit-Q1.pdf" ) # Apply a security profile config.apply_profile("hardened") # Verify all hosts comply compliance = config.verify_fleet() for host in compliance.non_compliant: print(f"⚠️ {host.name}: {host.issues}")

Why It Matters

← Back to UAML