12.0 Preparing Linux Workloads for Protection