Skip to content

Commit ec94be7

Browse files
authored
Apply suggestions from code review
1 parent 6d5ca2b commit ec94be7

File tree

1 file changed

+7
-8
lines changed
  • content/manuals/desktop/troubleshoot-and-support/troubleshoot

1 file changed

+7
-8
lines changed

content/manuals/desktop/troubleshoot-and-support/troubleshoot/topics.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -383,7 +383,7 @@ Your machine must have the following features for Docker Desktop to function cor
383383

384384
#### Error message
385385

386-
FSCTL_EXTEND_VOLUME \\?\Volume{GUID}: The media is write protected
386+
`FSCTL_EXTEND_VOLUME \\?\Volume{GUID}: The media is write protected`
387387

388388
#### Cause
389389

@@ -396,21 +396,20 @@ correctly because it requires read-write access to these volumes.
396396

397397
FDVDenyWriteAccess is a Windows Group Policy setting that, when enabled, prevents write access to fixed data drives that are not protected
398398
by BitLocker. This is often used in security-conscious environments but can interfere with development tools like Docker.
399-
In the Windows registry it can be found at HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FVE\FDVDenyWriteAccess.
399+
In the Windows registry it can be found at `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FVE\FDVDenyWriteAccess`.
400400

401401
#### Solutions
402402

403403
Docker Desktop does not support running Windows Containers on systems where FDVDenyWriteAccess is enabled. This setting interferes with the
404404
ability of Docker to mount volumes correctly, which is critical for container functionality.
405405

406-
To use Docker Desktop with Windows Containers, ensure that FDVDenyWriteAccess is disabled. You can check and change this setting in the registry or through Group Policy Editor (gpedit.msc) under:
406+
To use Docker Desktop with Windows Containers, ensure that FDVDenyWriteAccess is disabled. You can check and change this setting in the registry or through Group Policy Editor (`gpedit.msc`) under:
407407

408-
Computer Configuration -> Administrative Templates -> Windows Components -> BitLocker Drive Encryption -> Fixed Data Drives -> Deny write access to fixed drives not protected by BitLocker
408+
**Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Fixed Data Drives** > **Deny write access to fixed drives not protected by BitLocker**
409409

410-
Set this policy to "Not Configured" or "Disabled".
411-
412-
Note: Modifying Group Policy settings may require administrator privileges and should comply with your organization's IT policies. If the setting gets reset after some
413-
time this usually means that it got overriden by the centralized configuration of your IT department. Better talk to them before making any changes.
410+
> [!NOTE]
411+
>
412+
> Modifying Group Policy settings may require administrator privileges and should comply with your organization's IT policies. If the setting gets reset after some time this usually means that it was overriden by the centralized configuration of your IT department. Talk to them before making any changes.
414413

415414
##### WSL 2 and Windows Home
416415

0 commit comments

Comments
 (0)