diff --git a/content/manuals/enterprise/security/enforce-sign-in/methods.md b/content/manuals/enterprise/security/enforce-sign-in/methods.md
index dcbe2ecd7ab1..d365f93a3804 100644
--- a/content/manuals/enterprise/security/enforce-sign-in/methods.md
+++ b/content/manuals/enterprise/security/enforce-sign-in/methods.md
@@ -77,7 +77,21 @@ Deploy the registry key across your organization using Group Policy:
{{< summary-bar feature_name="Config profiles" >}}
-Configuration profiles provide the most secure enforcement method for macOS because they're protected by Apple's System Integrity Protection.
+Configuration profiles provide the most secure enforcement method for macOS, as they're protected by Apple's System Integrity Protection.
+
+The payload is a dictionary of key-values. Docker Desktop supports the following keys:
+
+- `allowedOrgs`: Sets a list of organizations in one single string, where each organization is separated by a semi-colon.
+
+In Docker Desktop version 4.48 and later, the following keys are also supported:
+
+- `overrideProxyHTTP`: Sets the URL of the HTTP proxy that must be used for outgoing HTTP requests.
+- `overrideProxyHTTPS`: Sets the URL of the HTTP proxy that must be used for outgoing HTTPS requests.
+- `overrideProxyExclude`: Bypasses proxy settings for the specified hosts and domains. Uses a comma-separated list.
+- `overrideProxyPAC`: Sets the file path where the PAC file is located. It has precedence over the remote PAC file on the selected proxy.
+- `overrideProxyEmbeddedPAC`: Sets the content of an in-memory PAC file. It has precedence over `overrideProxyPAC`.
+
+Overriding at least one of the proxy settings via Configuration profiles will automatically lock the settings as they're managed by macOS.
1. Create a file named `docker.mobileconfig` with this content:
```xml
@@ -104,6 +118,10 @@ Configuration profiles provide the most secure enforcement method for macOS beca
Your Company Name
allowedOrgs
first_org;second_org
+ overrideProxyHTTP
+ http://company.proxy:80
+ overrideProxyHTTPS
+ https://company.proxy:443
PayloadType
diff --git a/content/manuals/enterprise/security/hardened-desktop/settings-management/_index.md b/content/manuals/enterprise/security/hardened-desktop/settings-management/_index.md
index 1cb4713741be..4e84ac34a392 100644
--- a/content/manuals/enterprise/security/hardened-desktop/settings-management/_index.md
+++ b/content/manuals/enterprise/security/hardened-desktop/settings-management/_index.md
@@ -55,6 +55,7 @@ When multiple policies exist, Docker Desktop applies them in this order:
1. User-specific policies: Highest priority
1. Organization default policy: Applied when no user-specific policy exists
1. Local `admin-settings.json` file: Lowest priority, overridden by Admin Console policies
+1. [Configuration profiles](/manuals/enterprise/security/enforce-sign-in/methods.md#configuration-profiles-method-mac-only): Super-set of Docker Admin Console policies. Available with Docker Desktop version 4.48 and later.
## Set up Settings Management