Skip to content

Commit cc5af44

Browse files
committed
fix broken links
1 parent 5bbe30e commit cc5af44

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

desktop/hardened-desktop/enhanced-container-isolation/faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Yes, you can use the `--privileged` flag in containers but unlike privileged
2828
containers without Enhanced Container Isolation, the container can only use it's elevated privileges to
2929
access resources assigned to the container. It can't access global kernel
3030
resources in the Docker Desktop Linux VM. This allows you to run privileged
31-
containers securely. For more information, so [How it works](how-eci-works.md#privileged-containers-are-also-secured).
31+
containers securely. For more information, see [Key features and benefits](features-benefits.md#privileged-containers-are-also-secured).
3232

3333
#### Will all privileged container workloads run with Enhanced Container Isolation?
3434

@@ -78,7 +78,7 @@ administrative configurations for Docker Desktop, for example.
7878

7979
#### How is ECI different from Docker Engine's userns-remap mode?
8080

81-
See [How does it work](how-eci-works.md#enhanced-container-isolation-vs-docker-userns--remap-mode).
81+
See [How does it work](how-eci-works.md#enhanced-container-isolation-vs-docker-userns-remap-mode).
8282

8383
#### How is ECI different from Rootless Docker?
8484

desktop/hardened-desktop/enhanced-container-isolation/how-eci-works.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ keywords: set up, enhanced container isolation, rootless, security
1111
Enhanced Container Isolation hardens container isolation using the [Sysbox
1212
container runtime](https://github.com/nestybox/sysbox). Sysbox is a fork of the
1313
standard OCI runc runtime that was modified to enhance container isolation and
14-
workloads. For more details see [Under the covers](under-the-covers).
14+
workloads. For more details see [Under the covers](#under-the-hood).
1515

1616
Starting with version 4.13, Docker Desktop includes a customized version of
1717
Sysbox.
@@ -68,7 +68,7 @@ container isolation by leveraging the Linux user-namespace.
6868

6969
However, Enhanced Container Isolation is much more advanced since it assigns
7070
exclusive user-namespace mappings per container automatically and add several
71-
other [container isolation features](#under-the-covers) meant to secure Docker
71+
other [container isolation features](#under-the-hood) meant to secure Docker
7272
Desktop in organizations with stringent security requirements.
7373

7474
### Enhanced Container Isolation vs Rootless Docker

desktop/hardened-desktop/settings-management/configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ The following `admin-settings.json` code and table provides an example of the re
106106
| `configurationFileVersion` | |Specifies the version of the configuration file format. |
107107
| `exposeDockerAPIOnTCP2375` | <span class="badge badge-info">Windows only</span>| Exposes the Docker API on a specified port. If `value` is set to true, the Docker API is exposed on port 2375. Note: This is unauthenticated and should only be enabled if protected by suitable firewall rules.|
108108
| `proxy` | |If `mode` is set to `system` instead of `manual`, Docker Desktop gets the proxy values from the system and ignores and values set for `http`, `https` and `exclude`. Change `mode` to `manual` to manually configure proxy servers. If the proxy port is custom, specify it in the `http` or `https` property, for example `"https": "http://myotherproxy.com:4321"`. The `exclude` property specifies a comma-separated list of hosts and domains to bypass the proxy. |
109-
| `enhancedContainerIsolation` | | If `value` is set to true, Docker Desktop runs all containers as unprivileged, via the Linux user-namespace, prevents them from modifying sensitive configurations inside the Docker Desktop VM, and uses other advanced techniques to isolate them. For more information, see [Enhanced Container Isolation](../enhanced-container-isolation/index.md). Note: Enhanced Container Isolation is currently [incompatible with WSL](../enhanced-container-isolation/faq.md#incompatibility-with-wsl). |
109+
| `enhancedContainerIsolation` | | If `value` is set to true, Docker Desktop runs all containers as unprivileged, via the Linux user-namespace, prevents them from modifying sensitive configurations inside the Docker Desktop VM, and uses other advanced techniques to isolate them. For more information, see [Enhanced Container Isolation](../enhanced-container-isolation/index.md). Note: Enhanced Container Isolation is currently [incompatible with WSL](../enhanced-container-isolation/faq.md#incompatibility-with-windows-subsystem-for-linux-wsl). |
110110
| `linuxVM` | |Parameters and settings related to Linux VM options - grouped together here for convenience. |
111111
| &nbsp; &nbsp; &nbsp; &nbsp;`wslEngineEnabled` | <span class="badge badge-info">Windows only</span> | If `value` is set to true, Docker Desktop uses the WSL 2 based engine. This overrides anything that may have been set at installation using the `--backend=<backend name>` flag. It is also incompatible with Enhanced Container Isolation. See [Known issues](../enhanced-container-isolation/faq.md) for more information.|
112112
| &nbsp;&nbsp; &nbsp; &nbsp;`dockerDaemonOptions`| |If `value` is set to true, it overrides the options in the Docker Engine config file. See the [Docker Engine reference](/engine/reference/commandline/dockerd/#daemon-configuration-file). Note that for added security, a few of the config attributes may be overridden when Enhanced Container Isolation is enabled. |

0 commit comments

Comments
 (0)