You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**Use case:** Run Intel-based containers on Apple Silicon hosts.
171
+
172
+
> [!NOTE]
173
+
>
174
+
> In hardened environments, disable and lock this setting so only ARM-native
175
+
images are permitted.
176
+
171
177
-**Configure this setting with:**
172
178
-**General** settings in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
173
179
- Settings Management:`useVirtualizationFrameworkRosetta` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
@@ -196,6 +202,12 @@ mechanism. If both VirtioFS and gRPC are set to `true`, VirtioFS takes
-**Use case:** Improve volume mount performance and compatibility.
205
+
206
+
> [!NOTE]
207
+
>
208
+
> In hardened environments, enable and lock this setting for macOS 12.5 and
209
+
later.
210
+
199
211
-**Configure this setting with:**
200
212
-**General settings** in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
201
213
- Settings Management: `useVirtualizationFrameworkVirtioFS` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
@@ -211,13 +223,31 @@ precedence.
211
223
`true`, gRPC Fuse is set as the file sharing mechanism.
212
224
-**OS:** {{< badge color=blue text="Mac only" >}}
213
225
-**Use case:** Improve performance and compatibility of file mounts.
226
+
227
+
> [!NOTE]
228
+
>
229
+
> In hardened environments, disable and lock this setting.
230
+
214
231
-**Configure this setting with:**
215
232
-**General** settings in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
216
233
- Settings Management: `useGrpcfuse` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
217
234
- Settings Management: **Use gRPC FUSE for file sharing** setting in the [Admin Console](/manuals/security/for-admins/hardened-desktop/settings-management/configure-admin-console.md)
218
235
219
236
#### osxfs
220
237
238
+
| Default value | Accepted values | Format |
239
+
| ------------- | --------------- | ------- |
240
+
|`false`|`true`, `false`| Boolean |
241
+
242
+
-**Description:** Enable the legacy osxfs file sharing driver for macOS. When
243
+
set to true, Docker Desktop uses osxfs instead of VirtioFS or gRPC FUSE to mount
244
+
host directories into containers.
245
+
-**OS:** {{< badge color=blue text="Mac only" >}}
246
+
-**Use case:** Use the original file sharing implementation when compatibility
247
+
with older tooling or specific workflows is required.
248
+
-**Configure this setting with:**
249
+
-**General** settings in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
250
+
221
251
### Send usage statistics
222
252
223
253
| Default value | Accepted values | Format |
@@ -230,8 +260,15 @@ gathered from the Docker Desktop application itself. It does not affect
230
260
server-side telemetry collected via Docker Hub or other backend services, such
231
261
as login timestamps, pulls, or builds.
232
262
-**OS:** {{< badge color=blue text="All" >}}
233
-
-**Use case:** Manage telemetry collection for compliance, privacy, or
234
-
visibility in dashboards like Docker Insights.
263
+
-**Use case:** Enable analytics to help Docker improve the product based on
264
+
usage data.
265
+
266
+
> [!NOTE]
267
+
>
268
+
> In hardened environments, disable and lock this setting. This allows you
269
+
to control all your data flows and collect support logs via secure channels
270
+
if needed.
271
+
235
272
-**Configure this setting with:**
236
273
-**General** settings in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
237
274
- Settings Management: `analyticsEnabled` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
@@ -255,6 +292,11 @@ execution.
255
292
-**OS:** {{< badge color=blue text="All" >}}
256
293
-**Use case:** Prevent containers from modifying configuration or sensitive
257
294
host areas.
295
+
296
+
> [!NOTE]
297
+
>
298
+
> In hardened environments, disable and lock this setting.
299
+
258
300
-**Configure this setting with:**
259
301
-**General settings** in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
260
302
- Settings Management: `enhancedContainerIsolation` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
@@ -281,6 +323,12 @@ host areas.
281
323
-**Description:** Enable Docker Scout to generate and display SBOM data for container images.
282
324
-**OS:** {{< badge color=blue text="All" >}}
283
325
-**Use case:** Turn on Docker Scout analysis features to view vulnerabilities, packages, and metadata associated with images.
326
+
327
+
> [!NOTE]
328
+
>
329
+
> In hardened environments, enable and lock this setting to ensure SBOMs are
330
+
always built to satisfy compliance scans.
331
+
284
332
-**Configure this setting with:**
285
333
-**General settings** in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
286
334
- Settings Management: `sbomIndexing` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
@@ -295,6 +343,11 @@ host areas.
295
343
-**Description:** Automatically index SBOM data for images in the background without requiring user interaction.
296
344
-**OS:** {{< badge color=blue text="All" >}}
297
345
-**Use case:** Keep image metadata up to date by allowing Docker to perform SBOM indexing during idle time or after image pull operations.
346
+
347
+
> [!NOTE]
348
+
>
349
+
> In hardened environments, enable and lock this setting.
350
+
298
351
-**Configure this setting with:**
299
352
-**General settings** in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
300
353
@@ -395,6 +448,12 @@ host areas.
395
448
containers. When a path is added, its subdirectories are allowed.
396
449
-**OS:** {{< badge color=blue text="All" >}}
397
450
-**Use case:** Restrict or define what file paths are available to containers.
451
+
452
+
> [!NOTE]
453
+
>
454
+
> In hardened environments, lock to an explicit whitelist and disable end-user
455
+
edits.
456
+
398
457
-**Configure this setting with:**
399
458
-**File sharing** Resources settings in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
400
459
- Settings Management: `filesharingAllowedDirectories` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
@@ -410,6 +469,11 @@ containers. When a path is added, its subdirectories are allowed.
410
469
settings.
411
470
-**OS:** {{< badge color=blue text="All" >}}
412
471
-**Use case:** Fine-tune proxy exceptions for container networking.
472
+
473
+
> [!NOTE]
474
+
>
475
+
> In hardened environments, disable and lock this setting.
476
+
413
477
-**Configure this setting with:**
414
478
-**Proxies** Resources settings in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
415
479
- Settings Management: `proxy` setting with `manual` and `exclude` modes in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
@@ -463,6 +527,11 @@ based engine. This overrides anything that may have been set at installation
-**Use case:** Enable Linux containers via WSL 2 backend.
530
+
531
+
> [!NOTE]
532
+
>
533
+
> In hardened environments, enable and lock this setting.
534
+
466
535
-**Configure this setting with:**
467
536
-**WSL Integration** Resources settings in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
468
537
- Settings Management: `wslEngineEnabled` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
@@ -518,6 +587,11 @@ Builders settings lets you manage Buildx builder instances for advanced image-bu
518
587
-**Description:** Enable the integrated Kubernetes cluster in Docker Desktop.
519
588
-**OS:** {{< badge color=blue text="All" >}}
520
589
-**Use case:** Enable or disable Kubernetes support for developers.
590
+
591
+
> [!NOTE]
592
+
>
593
+
> In hardened environments, disable and lock this setting.
594
+
521
595
-**Configure this setting with:**
522
596
-**Kubernetes** settings in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
523
597
- Settings Management: `kubernetes` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
@@ -569,6 +643,11 @@ compatibility.
569
643
-**Description:** Show Kubernetes system containers in the Docker Dashboard container list
570
644
-**OS:** {{< badge color=blue text="All" >}}
571
645
-**Use case:** Allow developers to view kube-system containers for debugging
646
+
647
+
> [!NOTE]
648
+
>
649
+
> In hardened environments, disable and lock this setting.
650
+
572
651
-**Configure this setting with:**
573
652
-**Kubernetes** settings in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
574
653
@@ -585,6 +664,12 @@ value is set to `true`, checking for updates and notifications about Docker
585
664
Desktop updates are disabled.
586
665
-**OS:** {{< badge color=blue text="All" >}}
587
666
-**Use case:** Freeze the current version in enterprise environments.
667
+
668
+
> [!NOTE]
669
+
>
670
+
> In hardened environments, enable this setting and lock. This guarantees that
671
+
only internally vetted versions are installed.
672
+
588
673
-**Configure this setting with:**
589
674
- Settings Management: `disableUpdate` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
590
675
- Settings Management: **Disable update** setting in the [Admin Console](/manuals/security/for-admins/hardened-desktop/settings-management/configure-admin-console.md)
@@ -614,6 +699,12 @@ Desktop updates are disabled.
614
699
-**OS:** {{< badge color=blue text="All" >}}
615
700
-**Use case:** Control access to the Extensions Marketplace and installed
616
701
extensions.
702
+
703
+
> [!NOTE]
704
+
>
705
+
> In hardened environments, disable and lock this setting. This prevents
706
+
third-party or unvetted plugins from being installed.
707
+
617
708
-**Configure this setting with:**
618
709
-**Extensions** settings in [Docker Desktop GUI](/manuals/desktop/settings-and-maintenance/settings.md)
619
710
- Settings Management: `extensionsEnabled` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
@@ -815,6 +906,12 @@ The following settings aren’t shown in the Docker Desktop GUI. You can only co
815
906
-**Description:** Prevent users from loading local Docker images using the `docker load` command.
816
907
-**OS:** {{< badge color=blue text="All" >}}
817
908
-**Use case:** Enforce image provenance by restricting local image imports.
909
+
910
+
> [!NOTE]
911
+
>
912
+
> In hardened environments, enable and lock this setting. This forces all images
913
+
to come from your secure, scanned registry.
914
+
818
915
-**Configure this setting with:**
819
916
- Settings Management: `blockDockerLoad` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
820
917
@@ -827,6 +924,12 @@ The following settings aren’t shown in the Docker Desktop GUI. You can only co
827
924
-**Description:** Exposes the Docker API over an unauthenticated TCP socket on port 2375. Only recommended for isolated and protected environments.
-**Use case:** Required for legacy integrations or environments without named pipe support.
927
+
928
+
> [!NOTE]
929
+
>
930
+
> In hardened environments, disable and lock this setting. This ensures the
931
+
Docker API is only reachable via the secure internal socket.
932
+
830
933
-**Configure this setting with:**
831
934
- Settings Management: `exposeDockerAPIOnTCP2375` in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
832
935
@@ -898,6 +1001,11 @@ Docker socket access control (ECI exceptions)
898
1001
-**Description:** Enable access to beta features in Docker Desktop.
899
1002
-**OS:** {{< badge color=blue text="All" >}}
900
1003
-**Use case:** Give developers early access to features that are in public beta.
1004
+
1005
+
> [!NOTE]
1006
+
>
1007
+
> In hardened environments, disable and lock this setting.
1008
+
901
1009
-**Configure this setting with:**
902
1010
- Settings Management: `allowBetaFeatures` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
903
1011
@@ -910,6 +1018,12 @@ Docker socket access control (ECI exceptions)
910
1018
-**Description:** Override the Docker daemon configuration used in Linux or Windows containers.
911
1019
-**OS:** {{< badge color=blue text="All" >}}
912
1020
-**Use case:** Configure low-level Docker daemon options (e.g., logging, storage drivers) without editing the local config files.
1021
+
1022
+
> [!NOTE]
1023
+
>
1024
+
> In hardened environments, provide a vetted JSON config and lock it so no
1025
+
overrides are possible.
1026
+
913
1027
-**Configure this setting with:**
914
1028
- Settings Management: `linuxVM.dockerDaemonOptions` or `windowsContainers.dockerDaemonOptions` in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
915
1029
@@ -922,6 +1036,11 @@ Docker socket access control (ECI exceptions)
922
1036
-**Description:** Set the subnet used for internal VPNKit DHCP/DNS services.
923
1037
-**OS:** {{< badge color=blue text="Mac only" >}}
924
1038
-**Use case:** Prevent IP conflicts in environments with overlapping subnets.
1039
+
1040
+
> [!NOTE]
1041
+
>
1042
+
> In hardened environments, lock to an approved, non-conflicting CIDR.
1043
+
925
1044
-**Configure this setting with:**
926
1045
- Settings Management: `vpnkitCIDR` setting in the [`admin-settings.json` file](/manuals/security/for-admins/hardened-desktop/settings-management/configure-json-file.md)
927
1046
- Settings Management: **VPN Kit CIDR** setting in the [Admin Console](/manuals/security/for-admins/hardened-desktop/settings-management/configure-admin-console.md)
0 commit comments