Technical information (product name, version, configuration) of exposed services should not be accessible.
Attackers usually perform reconnaissance to gather information about the target system. Exposing detailed technical information makes it easier for attackers to identify potential vulnerabilities or outdated software versions that may have known security issues.
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |