Skip to content

Commit b1c5add

Browse files
committed
docs team review edits
1 parent 7e3c3fd commit b1c5add

File tree

2 files changed

+7
-53
lines changed

2 files changed

+7
-53
lines changed

content/guides/admin-set-up/comms-and-info-gathering.md

Lines changed: 2 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -24,55 +24,9 @@ Some companies may have more than one [Docker organization](/manuals/admin/organ
2424

2525
## Step three: Gather requirements
2626

27-
### Baseline configuration
27+
Through [Settings Management](/manuals/security/for-admins/hardened-desktop/settings-management/_index.md), Docker provides numerous configuration parameters that can be preset. The Docker organization owner, development lead, and infosec representative should review these settings to establish the company’s baseline configuration, including security features and [enforcing sign-in](/manuals/security/for-admins/enforce-sign-in/_index.md) for Docker Desktop users. Additionally, they should decide whether to take advantage of free trials for other Docker products, such as [Docker Scout](/manuals/scout/_index.md), which is included in the subscription.
2828

29-
Through [Settings Management](/manuals/security/for-admins/hardened-desktop/settings-management/_index.md), Docker offers a significant number of configuration parameters that can be preset.
30-
31-
The Docker organization owner and the development lead should review the settings to determine which of those settings to configure to create the company’s baseline configuration. You should also discuss [enforcing sign-in](/manuals/security/for-admins/enforce-sign-in/_index.md) for your Docker Desktop users and whether you want to take advantage of the free trials of other Docker products such as [Docker Scout](/manuals/scout/_index.md), which is included in the subscription.
32-
33-
{{< accordion title="Baseline settings to review" >}}
34-
35-
| Setting | OS Requirements | Description |
36-
|---------------------|-----------------|-----------------|
37-
| `proxy` | | This setting configures the proxy used by Docker Desktop to access the internet. The proxy can be set manually or get its value from the system.|
38-
| `wslEngineEnabled` | Windows only | This setting specifies whether the user should use WSL 2 or HyperV for the VM for Windows installations.|
39-
| `kubernetes` | | Docker Desktop offers a Kubernetes single-node cluster for Kubernetes deployments locally. This setting controls whether it is started when Docker Desktop starts, and its configuration.|
40-
| `analyticsEnabled` | | Docker lets users opt out of sending usage data to Docker. The usage data feeds what admins are able to see about Docker Desktop usage, so it is highly recommended to enable and lock this setting.|
41-
| `useVirtualizationFrameworkVirtioFS`| macOS only | Virtiofs is the newer higher performance file sharing framework for Mac. It takes precedence over the older frameworks if it is enabled.|
42-
| `useVirtualizationFrameworkRosetta` | macOS only | Rosetta is the Apple emulator for x86 chipsets. This setting lets Docker Desktop to use Rosetta when running containers built for the x86 chipset.|
43-
| `allowExperimentalFeatures` | | Docker Desktop versions often contain experimental features for trial and feedback. If this setting is set to false, experimental features are disabled.|
44-
| `allowBetaFeatures` | | Docker Desktop versions often contain beta features for trial and feedback. If this setting is set to false, beta features are disabled.|
45-
| `configurationFileVersion` | | Specifies the version of the configuration file format.|
46-
| `dockerDaemonOptions` - Linux Containers | | This setting overrides the options in the Docker Engine config file. For details, see the [Docker Engine reference](/reference/cli/dockerd.md#daemon-configuration-file). Note that for added security, a few of the config attributes may be overridden when Enhanced Container Isolation is enabled. |
47-
| `vpnkitCIDR` | | Overrides the network range used for vpnkit DHCP/DNS for `*.docker.internal` |
48-
| `dockerDaemonOptions` - Windows Containers | Windows only | This setting overrides the options in the daemon config file. For details, see the [Docker Engine reference](/reference/cli/dockerd.md#daemon-configuration-file).|
49-
| `extensionsEnabled` | | Docker extensions are third-party add-ons for Docker Desktop. This setting affects if they are allowed.|
50-
| `useGrpcfuse` | macOS only | If the value is set to true, gRPC Fuse is set as the file sharing mechanism. |
51-
| `displayedOnboarding` | | There is an onboarding survey that displays when Docker Desktop is installed and opened for the first time. This setting can disable the survey.|
52-
53-
{{< /accordion >}}
54-
55-
### Security configuration
56-
57-
Docker also offers a number of security related features, again through [Settings Management](/manuals/security/for-admins/hardened-desktop/settings-management/_index.md), that can be preset. The infosec representative, Docker organization owner, and the development lead should review those features to determine what should be enabled to meet your company’s security requirements.
58-
59-
{{< accordion title="Security settings to review" >}}
60-
61-
| Setting | OS Requirements | Description |
62-
|------------|-----------------|---------------|
63-
| Enhanced Container Isolation | | When this setting is enabled, Docker Desktop runs all containers as unprivileged, via the Linux user-namespace, and prevents them from modifying sensitive configurations inside the Docker Desktop VM, and uses other advanced techniques to isolate them. For more information, see [Enhanced Container Isolation](/manuals/security/for-admins/hardened-desktop/enhanced-container-isolation/_index.md). |
64-
| Registry Access Management | | This parameter restricts the registries that `docker pull` and `docker push` commands can access. Note: This is not an endpoint security solution, but a guardrail for users working within company guidelines. For more information, see [Registry Access Management](/manuals/security/for-admins/hardened-desktop/registry-access-management.md).|
65-
| Image Access Management | | This parameter restricts the categories of images accessible within Docker Hub. Note: This is not an endpoint security solution; it's a guardrail for users working within company guidelines. For more information, see [Image Access Management](/manuals/security/for-admins/hardened-desktop/image-access-management.md).|
66-
| Scout | | Settings related to how Scout creates SBOMs (Software Bill of Materials) and indexes vulnerabilities for images.|
67-
| `exposeDockerAPIOnTCP2375` | Windows only | Exposes the Docker API on a specified port. If the value is set to true, the Docker API is exposed on port `2375`. This is unauthenticated and should only be enabled if protected by suitable firewall rules.|
68-
| `windowsDockerdPort` | Windows only | Exposes Docker Desktop's internal proxy locally on this port for the Windows Docker daemon to connect to. It is available for Windows containers only. |
69-
| `filesharingAllowedDirectories` | | Specify which paths on the developer host machine or network your users can add container file shares to.|
70-
| `enableKerberosNtlm` | | When set to true, Kerberos and NTLM authentication is enabled. Default is false. Available in Docker Desktop version 4.32 and later.|
71-
| `containersProxy` | | Lets you create air-gapped containers. For more information, see [Air-Gapped Containers](/manuals/security/for-admins/hardened-desktop/air-gapped-containers.md).|
72-
| `blockDockerLoad` | | When this setting is enabled, users can no longer run the `docker load` command and will receive an error if they try.|
73-
| `disableUpdate` | | Users get notifications about new Docker Desktop versions. Enabling this setting removes those notifications. Helpful if corporate IT manages Docker Desktop version updates for users.|
74-
75-
{{< /accordion >}}
29+
To view the parameters that can be preset, see [Configure Settings Management](/manuals/security/for-admins/hardened-desktop/settings-management/configure.md#step-two-configure-the-settings-you-want-to-lock-in).
7630

7731
## Optional step four: Meet with the Docker Implementation team
7832

content/guides/admin-set-up/finalize-plans-and-setup.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ weight: 20
88

99
After reaching an agreement with the relevant teams on your baseline and security configurations as outlined in module one, follow the instructions in the [Settings Management](/manuals/security/for-admins/hardened-desktop/settings-management/_index.md) documentation to create the `admin-settings.json` file that captures these configurations.
1010

11-
Once the file is ready, collaborate with your MDM team to deploy the `admin-settings.json` file, along with your chosen method for [enforcing sign-in](/manuals/security/for-admins/enforce-sign-in/_index.md)..
11+
Once the file is ready, collaborate with your MDM team to deploy the `admin-settings.json` file, along with your chosen method for [enforcing sign-in](/manuals/security/for-admins/enforce-sign-in/_index.md).
1212

1313
> [!IMPORTANT]
1414
>
@@ -22,22 +22,22 @@ If you have more than one organization, it’s recommended that you either conso
2222

2323
### Set up single sign-on SSO domain verification
2424

25-
Single sign-on (SSO) lets developers to authenticate using their identity providers (IdPs) to access Docker. SSO is available for a whole company, and all associated organizations, or an individual organization that has a Docker Business subscription. For more information, see the [documentation](/manuals/security/for-admins/single-sign-on/_index.md).
25+
Single sign-on (SSO) lets developers authenticate using their identity providers (IdPs) to access Docker. SSO is available for a whole company, and all associated organizations, or an individual organization that has a Docker Business subscription. For more information, see the [documentation](/manuals/security/for-admins/single-sign-on/_index.md).
2626

27-
You can also enable [SCIM] for further automation of provisioning and deprovisioning of users.
27+
You can also enable [SCIM](/manuals/security/for-admins/provisioning/scim.md) for further automation of provisioning and deprovisioning of users.
2828

2929
### Set up free tier Docker product entitlements included in the subscription
3030

3131
[Docker Build Cloud](/manuals/build-cloud/_index.md) significantly reduces build times, both locally and in CI, by providing a dedicated remote builder and shared cache. Powered by the cloud, developer time and local resources are freed up so your team can focus on more important things, like innovation. To get started, [set up a cloud builder](http://build.docker.com).
3232

3333
[Docker Scout](manuals/scout/_index.md) is a solution for proactively enhancing your software supply chain security. By analyzing your images, Docker Scout compiles an inventory of components, also known as a Software Bill of Materials (SBOM). The SBOM is matched against a continuously updated vulnerability database to pinpoint security weaknesses. To get started, see [Quickstart](/manuals/scout/quickstart.md).
3434

35-
### Ensure supported version of Docker Desktop
35+
### Ensure you're running a supported version of Docker Desktop
3636

3737
> [!WARNING]
3838
>
3939
> This step could affect the experience for users on older versions of Docker Desktop.
4040
41-
Existing users may be running outdated or unsupported versions of Docker Desktop. It is highly recommended all users update to a supported version. Docker Desktop versions released within the past 6 months from the latest release are supported.
41+
Existing users may be running outdated or unsupported versions of Docker Desktop. It is highly recommended that all users update to a supported version. Docker Desktop versions released within the past 6 months from the latest release are supported.
4242

4343
It's recommended that you use a MDM solution to manage the version of Docker Desktop for users. Users may also get Docker Desktop directly from Docker or through a company software portal.

0 commit comments

Comments
 (0)