How Sentinel LDK Detects Machine Cloning
This appendix describes the techniques employed by Sentinel LDK to prevent unauthorized use of protected software when the physical or virtual machine on which the software is installed is cloned.
This topic is only relevant for software protected with a Sentinel SL key. Software that is protected by a Sentinel HL key is not vulnerable to machine cloning.
For more information on protecting software against cloning, see Specifying the License Terms for Features in a Product.
In this appendix:
>How Clone Protection Schemes Work
>Understanding the "Platform Default" Clone Protection Scheme