As a security best practice, configure your vRealize Automation system to limit information available to potential attackers.

To the extent possible, minimize the amount of information that your system shares about its identity and version. Hackers and malicious actors can use this information to craft targeted attacks against your Web server or version.