content/manuals/enterprise/security/hardened-desktop/enhanced-container-isolation/faq.md
{{< summary-bar feature_name="Hardened Docker Desktop" >}}
This page answers common questions about Enhanced Container Isolation (ECI) that aren't covered in the main documentation.
No. ECI works automatically in the background by creating more secure containers. You can continue using all your existing Docker commands, workflows, and development tools without any changes.
Most container workloads run without issues when ECI is turned on. However, some advanced workloads that require specific kernel-level access may not work. For details about which workloads are affected, see ECI limitations.
--privileged flag?Privileged containers serve legitimate purposes like Docker-in-Docker, Kubernetes-in-Docker, and accessing hardware devices. ECI provides a better solution by allowing these advanced workloads to run securely while preventing them from compromising the Docker Desktop VM.
ECI has minimal impact on container performance. The only exception is containers that perform many mount and umount system calls, as these are inspected by the Sysbox runtime for security. Most development workloads see no noticeable performance difference.
No. When ECI is turned on, all containers use the Sysbox runtime regardless of any --runtime flags:
$ docker run --runtime=runc alpine echo "test"
# This still uses sysbox-runc, not runc
The --runtime flag is ignored to prevent users from bypassing ECI security by running containers as true root in the Docker Desktop VM.
No. ECI only protects containers created after it's turned on. Remove existing containers before turning on ECI:
$ docker stop $(docker ps -q)
$ docker rm $(docker ps -aq)
For more details, see Enable Enhanced Container Isolation.
ECI protection varies by container type and Docker Desktop version:
docker run and docker createdocker-container build driverFor complete details, see ECI limitations.
By default, no. ECI blocks Docker socket bind mounts for security. However, you can configure exceptions for trusted images like Testcontainers.
For configuration details, see Configure Docker socket exceptions.
ECI restricts bind mounts of Docker Desktop VM directories but allows host directory mounts configured in Docker Desktop Settings.