Skip to content

publish updates from main #22933

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 3 commits into
base: published
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion content/manuals/desktop/setup/install/windows-install.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ _For checksums, see [Release notes](/manuals/desktop/release-notes.md)_
- 64-bit processor with [Second Level Address Translation (SLAT)](https://en.wikipedia.org/wiki/Second_Level_Address_Translation)
- 4GB system RAM
- Enable hardware virtualization in BIOS/UEFI. For more information, see
[Virtualization](/manuals/desktop/troubleshoot-and-support/troubleshoot/topics.md#virtualization).
[Virtualization](/manuals/desktop/troubleshoot-and-support/troubleshoot/topics.md#docker-desktop-fails-due-to-virtualization-not-working).

For more information on setting up WSL 2 with Docker Desktop, see [WSL](/manuals/desktop/features/wsl/_index.md).

Expand Down
11 changes: 6 additions & 5 deletions content/manuals/dhi/about/what.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,11 +56,12 @@ so you don’t have to.
Level 3](../core-concepts/slsa.md), ensuring a tamper-resistant, verifiable,
and auditable build process that protects against supply chain threats.

- Distroless approach: Unlike traditional base images that bundle an entire OS
with shells and package managers, [distroless
images](../core-concepts/distroless.md) exclude the OS layer and include only
your app and its runtime dependencies, reducing the attack surface by up to 95
percent and improving performance.
- Distroless approach: Unlike traditional base images that bundle an entire OS
with shells, package managers, and debugging tools, [distroless
images](../core-concepts/distroless.md) retain only the minimal OS components
required to run your application. By excluding unnecessary tooling and
libraries, they reduce the attack surface by up to 95% and can improve
performance and image size.

- Continuous maintenance: All DHIs are continuously monitored and updated to
maintain near-zero known exploitable [CVEs](../core-concepts/cves.md), helping
Expand Down
8 changes: 4 additions & 4 deletions content/manuals/scout/explore/dashboard.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,10 +11,10 @@ aliases:

The [Docker Scout Dashboard](https://scout.docker.com/) helps you share the
analysis of images in an organization with your team. Developers can now see an
overview of their security status across all their images from both Docker Hub
and Artifactory, and get remediation advice at their fingertips. It helps team
members in roles such as security, compliance, and operations to know what
vulnerabilities and issues they need to focus on.
overview of their security status across all their images from Docker Hub, and
get remediation advice at their fingertips. It helps team members in roles such
as security, compliance, and operations to know what vulnerabilities and issues
they need to focus on.

## Overview

Expand Down
Binary file not shown.
1 change: 0 additions & 1 deletion content/manuals/scout/integrations/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ aren't hosted on Docker Hub.

The following container registry integrations are available:

- [Artifactory](./registry/artifactory.md)
- [Amazon Elastic Container Registry](./registry/ecr.md)
- [Azure Container Registry](./registry/acr.md)

Expand Down
191 changes: 0 additions & 191 deletions content/manuals/scout/integrations/registry/artifactory.md

This file was deleted.

5 changes: 1 addition & 4 deletions content/manuals/scout/release-notes/platform.md
Original file line number Diff line number Diff line change
Expand Up @@ -297,12 +297,9 @@ documentation](../integrations/environment/sysdig.md).
The new JFrog Artifactory integration enables automatic image analysis on
Artifactory registries.

![Animation of how to integrate Artifactory](../images/release-notes/artifactory-agent.gif)

The integration involves deploying a Docker Scout Artifactory agent that polls
for new images, performs analysis, and uploads results to Docker Scout, all
while preserving the integrity of image data. Learn more in the [Artifactory
integration documentation](../integrations/registry/artifactory.md)
while preserving the integrity of image data.

#### Known limitations

Expand Down