When in passthrough mode, the MX is best used for in-line:
Layer 3/7 firewall rules, traffic shaping, and analysis
Network asset discovery and reporting
Intrusion detection
Client and site-to-site VPN
I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.
Please, if this post was useful, leave your kudos and mark it as solved.