Skip to content

Commit 4e6d2ae

Browse files
vale corrections
1 parent 0be4262 commit 4e6d2ae

File tree

15 files changed

+23
-20
lines changed

15 files changed

+23
-20
lines changed

_vale/config/vocabularies/Docker/accept.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ Artifactory
99
auditable
1010
autolock
1111
Azure
12+
Azure AD
1213
bootup
1314
Btrfs
1415
Bugsnag
@@ -142,6 +143,7 @@ osxfs
142143
OTel
143144
Paketo
144145
pgAdmin
146+
plist
145147
PKG
146148
Postgres
147149
PowerShell
@@ -172,6 +174,7 @@ Syft
172174
syntaxes
173175
Sysbox
174176
sysctls
177+
sysctl
175178
Sysdig
176179
systemd
177180
Testcontainers

content/manuals/desktop/troubleshoot-and-support/troubleshoot/topics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -491,8 +491,8 @@ To use Docker Desktop with Windows Containers, ensure that FDVDenyWriteAccess is
491491
**Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Fixed Data Drives** > **Deny write access to fixed drives not protected by BitLocker**
492492

493493
> [!NOTE]
494-
>
495-
> Modifying Group Policy settings may require administrator privileges and should comply with your organization's IT policies. If the setting gets reset after some time this usually means that it was overriden by the centralized configuration of your IT department. Talk to them before making any changes.
494+
>
495+
> Modifying Group Policy settings may require administrator privileges and should comply with your organization's IT policies. If the setting gets reset after some time this usually means that it was overridden by the centralized configuration of your IT department. Talk to them before making any changes.
496496
497497
### `Docker Desktop Access Denied` error message when starting Docker Desktop
498498

content/manuals/enterprise/security/hardened-desktop/air-gapped-containers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ function FindProxyForURL(url, host) {
174174
}
175175
}
176176

177-
// Block access to developer's localhost to prevent data exfiltration
177+
// Block access to developer's localhost
178178
if (host === "host.docker.internal" || host === "localhost") {
179179
return "PROXY reject.docker.internal:1234";
180180
}

content/manuals/enterprise/security/hardened-desktop/enhanced-container-isolation/config.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ Docker Desktop validates allowed images by:
115115
1. Comparing container image digests against the allowlist when containers start
116116
1. Blocking containers whose digests don't match allowed images
117117

118-
This prevents bypassing restrictions by retagging unauthorized images:
118+
This prevents bypassing restrictions by re-tagging unauthorized images:
119119

120120
```console
121121
$ docker tag malicious-image docker:cli

content/manuals/enterprise/security/hardened-desktop/enhanced-container-isolation/faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ ECI protection varies by container type and Docker Desktop version:
7171

7272
- Docker Extensions
7373
- Docker Debug containers
74-
- Kubernetes with kubeadm provisioner
74+
- Kubernetes with Kubeadm provisioner
7575

7676
For complete details, see [ECI limitations](/manuals/enterprise/security/hardened-desktop/enhanced-container-isolation/limitations.md).
7777

content/manuals/enterprise/security/hardened-desktop/enhanced-container-isolation/limitations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ containers mode isn't supported.
4747

4848
## Docker Build protection varies
4949

50-
Docker Build proection depends on the driver and Docker Desktop version:
50+
Docker Build protection depends on the driver and Docker Desktop version:
5151

5252
| Build drive | Protection | Version requirements |
5353
|:------------|:-----------|:---------------------|

content/manuals/enterprise/security/hardened-desktop/settings-management/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ When multiple policies exist, Docker Desktop applies them in this order:
5454

5555
1. User-specific policies: Highest priority
5656
1. Organization default policy: Applied when no user-specific policy exists
57-
1. Local `admin-settings.json` file: Lowest priority, overriden by Admin Console policies
57+
1. Local `admin-settings.json` file: Lowest priority, overridden by Admin Console policies
5858

5959
## Set up Settings Management
6060

content/manuals/enterprise/security/hardened-desktop/settings-management/settings-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ methods are indicated with these labels:
2323

2424
- Desktop GUI: Configurable through Docker Desktop settings interface
2525
- Admin Console: Configurable through the Docker Admin Console using Settings Management
26-
- JSON file: Configurable htrough `admin-settings.json` using Settings Managemet
26+
- JSON file: Configurable through `admin-settings.json` using Settings Management
2727
- CLI: Configurable through command-line tools
2828

2929
## General settings
@@ -344,7 +344,7 @@ if needed.
344344

345345
- **Description:** Automatic SBOM indexing for images without requiring user interaction.
346346
- **OS:** {{< badge color=blue text="All" >}}
347-
- **Use case:** KKeep image metadata current by indexing during idle time or after image operations.
347+
- **Use case:** Keep image metadata current by indexing during idle time or after image operations.
348348
- **Configure this setting with:**
349349
- **General settings** in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
350350

content/manuals/enterprise/security/provisioning/just-in-time.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This page explains how JIT provisioning works, SSO authentication flows, and how
1616

1717
## Prerequisites
1818

19-
Before you beging, you must have:
19+
Before you begin, you must have:
2020

2121
- SSO configured for your organization
2222
- Administrator access to Docker Home and your identity provider

content/manuals/enterprise/security/provisioning/scim.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ To enable SCIM:
8383

8484
1. Sign in to [Docker Home](https://app.docker.com).
8585
1. Select **Admin Console**, then **SSO and SCIM**.
86-
1. In the **SSO connections** table, select the **Actions** icon for your conection, then select **Setup SCIM**.
86+
1. In the **SSO connections** table, select the **Actions** icon for your connection, then select **Setup SCIM**.
8787
1. Copy the **SCIM Base URL** and **API Token** and paste the values into your IdP.
8888

8989
## Enable SCIM in your IdP

0 commit comments

Comments
 (0)