@@ -69,22 +69,42 @@ See [ECI Docker socket mount permissions](config.md#docker-socket-mount-permissi
6969Not yet. It protects all containers launched by users via ` docker create ` and
7070` docker run ` .
7171
72- Prior to Docker Desktop 4.30, it did not protect containers implicitly used by
73- ` docker build ` with the ` docker ` build driver (the default driver). Starting
74- with Docker Desktop 4.30, it protects such containers, except for Docker Desktop
75- on WSL 2 (Windows hosts).
72+ For containers implicitly created by ` docker build ` as well as Docker
73+ Desktop's integrated Kubernetes, protection varies depending on the Docker
74+ Desktop version (see the next two FAQs below).
7675
77- Note that ECI always protects containers used by ` docker build ` , when using the
78- [ docker-container build driver] ( /manuals/build/builders/drivers/_index.md ) , since Docker
79- Desktop 4.19 and on all supported platforms (Windows with WSL 2 or Hyper-V, Mac,
80- and Linux).
76+ ECI does not yet protect Docker Desktop Extension containers and
77+ [ Dev Environments containers] ( /manuals/desktop/features/dev-environments/_index.md ) .
8178
82- ECI does not yet protect Docker Desktop Kubernetes pods, Extension containers,
83- and [ Dev Environments containers] ( /manuals/desktop/features/dev-environments/_index.md ) .
79+ ### Does ECI protect containers implicitly used by "docker build"?
80+
81+ Prior to Docker Desktop 4.19, ECI did not protect containers used implicitly
82+ by ` docker build ` during the build process.
83+
84+ Since Docker Desktop 4.19, ECI protects containers used by ` docker build `
85+ when using the [ docker-container build driver] ( /manuals/build/builders/drivers/_index.md ) .
86+
87+ In addition, since Docker Desktop 4.30, ECI also protects containers used by
88+ ` docker build ` when using the ` docker ` build driver (the default driver), on all
89+ platforms supported by Docker Desktop except Windows with WSL 2.
90+
91+ ### Does ECI protect Kubernetes in Docker Desktop?
92+
93+ Prior to Docker Desktop 4.38, ECI did not protect the Kubernetes cluster
94+ integrated in Docker Desktop.
95+
96+ Since Docker Desktop 4.38, ECI protects the integreated Kubernetes cluster
97+ when using the new "kind" provisioner (see [ Deploy On Kubernetes] ( ../../../../desktop/features/kubernetes.md ) ).
98+ In this case, each node in the multi-node Kubernetes cluster is actually an ECI
99+ protected container. With ECI disabled, each node in the Kubernetes cluster is
100+ a less-secure fully privileged container.
101+
102+ ECI does not protect the integrated Kubernetes cluster when using the
103+ older "Kubeadm" provisioner (single-node cluster).
84104
85105### Does ECI protect containers launched prior to enabling ECI?
86106
87- No. Containers created prior to switching on ECI are not protected. Therefore, it is
107+ No. Containers created prior to switching on ECI are not protected. Therefore, it is
88108recommended you remove all containers prior to switching on ECI.
89109
90110### Does ECI affect the performance of containers?
0 commit comments