This was historically the case. About 6 months ago the VMX gained support for NAT mode, and Meraki changed it so this is now the default deployment option (bad!!!).
https://documentation.meraki.com/MX/Other_Topics/vMX_NAT_Mode_Use_Cases_and_FAQ .
This was done primarily to offer full tunnel client VPN support for VMX. In NAT mode, a user can VPN in and access the Internet (the VMX will NAT their traffic).
HOWEVER, all AutoVPN spoke traffic is also NATed when accessing cloud servers. The bonus of this is you no longer need to configure any routing in the public cloud - as all traffic (client VPN and AutoVPN) is NATed to the VMX private IP address and appears to come from that IP.
This is a major pain. Servers CAN NOT access spokes - because the spokes sit behind NAT. For example, you can't have a server in the cloud send a print job to a printer on-premise over AutoVPN using a VMX in NAT mode (actually I lie - you can make it work, but you have to configure NAT port forwards, just like if you have a physical MX attached to the Internet and wanted to give access to something from the Internet to an internal server - but this is a nasty solution for this use case).
As a consequence of this, I never use NAT mode for VMX. Also note you can't change this setting post-deployment. If you want to change it you have to delete the VMX and re-deploy it.
Looping full circle, now you can have a VMX in NAT mode like a "typical" on-premise VMX.
Does the VMX support IPS or contenting filtering while running in NAT mode (like its on-premise counterpart)? I don't know. I have never used NAT mode on VMX, so have never tested this out. But I think there is a reasonable chance this will work.