Hi.
Is a best practice in IPv4 too. It is the way to avoid sending network discovery packets to interfaces. A premise for security is meanwhile people now you less is better for your security.
Through ND packets you send information like routerOS version, software ID, plataform, interface name, uptime, IP address, etc. So it is not a good idea tell everybody this info.
You can active only in interface you trust like between your routers (administrate by you) interface, but in public interface it is not a good idea.
I think you're thinking of the RouterOS based discovery (CDP and their own version or LLDP I can't remember).
The OP is talking about the IPv6 Neighbor Discovery protocol. Now my viewpoint is that disabling IPv6 ND especially in RouterOS would be a pretty dimwitted thing to do. At least if you have upstream IPv6. If you don't then, yes it's probably a smart thing to do. The reason for the dimwittedness remark is because RouterOS does not have a DHCPv6 server implementation. Also, even if it did certain devices, namely Android phones, require IPv6 ND to function.
TLDR; don't disable it unless you have a good reason to. Even in a LAN without upstream IPv6 local communications via link-local addressing could still take place over it. From a security stand-point you'd catch a lot more bees with honey and that honey should be RA Guard. It's a feature in Cisco-land that acts a lot like ARP protection but it can be applied with an ACL (possible a bridge filter), you'd want to prevent host ports from sending RA messages (a type of IPv6 ND message) which can cause a man-in-the-middle attack.