This appendix describes the techniques employed by Sentinel LDK to prevent unauthorized use of protected software when the physical or virtual machine on which the software is installed is cloned. In addition, the appendix describes how you can examine the fingerprints from a machine to determine whether the machine and its protection keys were intentionally cloned.
This topic is only relevant for software protected with a Sentinel SL key. Software that is protected by a Sentinel HL key is not vulnerable to machine cloning.
For more information on protecting software against cloning, see Specifying the License Terms for Features in a Product.
In this appendix: