You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/manuals/desktop/troubleshoot-and-support/troubleshoot/topics.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -383,7 +383,7 @@ Your machine must have the following features for Docker Desktop to function cor
383
383
384
384
#### Error message
385
385
386
-
FSCTL_EXTEND_VOLUME \\?\Volume{GUID}: The media is write protected
386
+
`FSCTL_EXTEND_VOLUME \\?\Volume{GUID}: The media is write protected`
387
387
388
388
#### Cause
389
389
@@ -396,21 +396,20 @@ correctly because it requires read-write access to these volumes.
396
396
397
397
FDVDenyWriteAccess is a Windows Group Policy setting that, when enabled, prevents write access to fixed data drives that are not protected
398
398
by BitLocker. This is often used in security-conscious environments but can interfere with development tools like Docker.
399
-
In the Windows registry it can be found at HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FVE\FDVDenyWriteAccess.
399
+
In the Windows registry it can be found at `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FVE\FDVDenyWriteAccess`.
400
400
401
401
#### Solutions
402
402
403
403
Docker Desktop does not support running Windows Containers on systems where FDVDenyWriteAccess is enabled. This setting interferes with the
404
404
ability of Docker to mount volumes correctly, which is critical for container functionality.
405
405
406
-
To use Docker Desktop with Windows Containers, ensure that FDVDenyWriteAccess is disabled. You can check and change this setting in the registry or through Group Policy Editor (gpedit.msc) under:
406
+
To use Docker Desktop with Windows Containers, ensure that FDVDenyWriteAccess is disabled. You can check and change this setting in the registry or through Group Policy Editor (`gpedit.msc`) under:
407
407
408
-
Computer Configuration -> Administrative Templates -> Windows Components -> BitLocker Drive Encryption -> Fixed Data Drives -> Deny write access to fixed drives not protected by BitLocker
408
+
**Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Fixed Data Drives** > **Deny write access to fixed drives not protected by BitLocker**
409
409
410
-
Set this policy to "Not Configured" or "Disabled".
411
-
412
-
Note: Modifying Group Policy settings may require administrator privileges and should comply with your organization's IT policies. If the setting gets reset after some
413
-
time this usually means that it got overriden by the centralized configuration of your IT department. Better talk to them before making any changes.
410
+
> [!NOTE]
411
+
>
412
+
> Modifying Group Policy settings may require administrator privileges and should comply with your organization's IT policies. If the setting gets reset after some time this usually means that it was overriden by the centralized configuration of your IT department. Talk to them before making any changes.
0 commit comments