Skip to content

Commit 841a135

Browse files
committed
move location of content
1 parent ec94be7 commit 841a135

File tree

1 file changed

+32
-32
lines changed
  • content/manuals/desktop/troubleshoot-and-support/troubleshoot

1 file changed

+32
-32
lines changed

content/manuals/desktop/troubleshoot-and-support/troubleshoot/topics.md

Lines changed: 32 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -379,38 +379,6 @@ Note some third-party software such as Android emulators will disable Hyper-V on
379379

380380
Your machine must have the following features for Docker Desktop to function correctly:
381381

382-
### Docker Desktop with Windows Containers fails with "The media is write protected""
383-
384-
#### Error message
385-
386-
`FSCTL_EXTEND_VOLUME \\?\Volume{GUID}: The media is write protected`
387-
388-
#### Cause
389-
390-
If you're encountering failures when running Docker Desktop with Windows Containers, it might be due to
391-
a specific Windows configuration policy: FDVDenyWriteAccess.
392-
393-
This policy, when enabled, causes Windows to mount all fixed drives not encrypted by BitLocker-encrypted as read-only.
394-
This also affects virtual machine volumes and as a result, Docker Desktop may not be able to start or run containers
395-
correctly because it requires read-write access to these volumes.
396-
397-
FDVDenyWriteAccess is a Windows Group Policy setting that, when enabled, prevents write access to fixed data drives that are not protected
398-
by BitLocker. This is often used in security-conscious environments but can interfere with development tools like Docker.
399-
In the Windows registry it can be found at `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FVE\FDVDenyWriteAccess`.
400-
401-
#### Solutions
402-
403-
Docker Desktop does not support running Windows Containers on systems where FDVDenyWriteAccess is enabled. This setting interferes with the
404-
ability of Docker to mount volumes correctly, which is critical for container functionality.
405-
406-
To use Docker Desktop with Windows Containers, ensure that FDVDenyWriteAccess is disabled. You can check and change this setting in the registry or through Group Policy Editor (`gpedit.msc`) under:
407-
408-
**Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Fixed Data Drives** > **Deny write access to fixed drives not protected by BitLocker**
409-
410-
> [!NOTE]
411-
>
412-
> Modifying Group Policy settings may require administrator privileges and should comply with your organization's IT policies. If the setting gets reset after some time this usually means that it was overriden by the centralized configuration of your IT department. Talk to them before making any changes.
413-
414382
##### WSL 2 and Windows Home
415383

416384
1. Virtual Machine Platform
@@ -494,6 +462,38 @@ The Virtual Machine Management Service failed to start the virtual machine 'Dock
494462

495463
Try [enabling nested virtualization](/manuals/desktop/setup/vm-vdi.md#turn-on-nested-virtualization).
496464

465+
### Docker Desktop with Windows Containers fails with "The media is write protected""
466+
467+
#### Error message
468+
469+
`FSCTL_EXTEND_VOLUME \\?\Volume{GUID}: The media is write protected`
470+
471+
#### Cause
472+
473+
If you're encountering failures when running Docker Desktop with Windows Containers, it might be due to
474+
a specific Windows configuration policy: FDVDenyWriteAccess.
475+
476+
This policy, when enabled, causes Windows to mount all fixed drives not encrypted by BitLocker-encrypted as read-only.
477+
This also affects virtual machine volumes and as a result, Docker Desktop may not be able to start or run containers
478+
correctly because it requires read-write access to these volumes.
479+
480+
FDVDenyWriteAccess is a Windows Group Policy setting that, when enabled, prevents write access to fixed data drives that are not protected
481+
by BitLocker. This is often used in security-conscious environments but can interfere with development tools like Docker.
482+
In the Windows registry it can be found at `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FVE\FDVDenyWriteAccess`.
483+
484+
#### Solutions
485+
486+
Docker Desktop does not support running Windows Containers on systems where FDVDenyWriteAccess is enabled. This setting interferes with the
487+
ability of Docker to mount volumes correctly, which is critical for container functionality.
488+
489+
To use Docker Desktop with Windows Containers, ensure that FDVDenyWriteAccess is disabled. You can check and change this setting in the registry or through Group Policy Editor (`gpedit.msc`) under:
490+
491+
**Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Fixed Data Drives** > **Deny write access to fixed drives not protected by BitLocker**
492+
493+
> [!NOTE]
494+
>
495+
> Modifying Group Policy settings may require administrator privileges and should comply with your organization's IT policies. If the setting gets reset after some time this usually means that it was overriden by the centralized configuration of your IT department. Talk to them before making any changes.
496+
497497
### `Docker Desktop Access Denied` error message when starting Docker Desktop
498498

499499
#### Error message

0 commit comments

Comments
 (0)