EVERY backup product I've ever worked with has their own guidelines as to what you should exclude from AV scanning. The kind of traffic a backup app generates can be flagged as a DOS attack, or the agents on a host making system calls and registry changes could be mistaken as malicious behavior...
Something to think about before calling out the AV vendor, when it really applies to the entire industry....