Clarify when sandboxing is enabled.

PiperOrigin-RevId: 386445443
diff --git a/site/docs/guide.md b/site/docs/guide.md
index f10ea35..5b29613 100644
--- a/site/docs/guide.md
+++ b/site/docs/guide.md
@@ -605,8 +605,10 @@
 
 #### Sandboxed execution
 
-Bazel uses sandboxes to guarantee that actions run hermetically<sup>1</sup> and
-correctly. Bazel runs _Spawns_ (loosely speaking: actions) in sandboxes that
+NOTE: Sandboxing is enabled by default for local execution.
+
+Bazel can use sandboxes to guarantee that actions run hermetically<sup>1</sup>
+and correctly. Bazel runs _spawns_ (loosely speaking: actions) in sandboxes that
 only contain the minimal set of files the tool requires to do its job. Currently
 sandboxing works on Linux 3.12 or newer with the `CONFIG_USER_NS` option
 enabled, and also on macOS 10.11 or newer.
diff --git a/site/docs/user-manual.html b/site/docs/user-manual.html
index 7796002..ba1df96 100644
--- a/site/docs/user-manual.html
+++ b/site/docs/user-manual.html
@@ -909,7 +909,9 @@
     <code>sandboxed</code> causes commands to be executed inside a sandbox on the local machine.
     This requires that all input files, data dependencies and tools are listed as direct
     dependencies in the <code>srcs</code>, <code>data</code> and <code>tools</code> attributes.
-    This is the default on systems that support sandboxed execution.
+
+    
+    Bazel enables local sandboxing by default, on systems that support sandboxed execution.
   </li>
 
   <li>