Hi @Dena,
If the target device reported on the event has been connected LAN interface or sitting downstream through the LAN interface on MX,
You can try taking packet capture and filter by the mac address to see which VLAN ID is actually added in layer 2 header for the confirmation.
You can take packet capture from:
Network-wide > Packet capture > Set Security appliance as the target device and LAN port as target interface, then download it as .pcap format for you to load and analyse it on your Wireshark.
You can filter by "eth.addr:'Target mac address'" helps you to see traffic from / to the mac address.
Hope this would help your confirmation!
~~If you found this post helpful, please give it kudos. If my answer solved your problem, click "accept as solution" so that others can benefit from it.~~
The Meraki ECMS exam is now live! Test your knowledge of Meraki and become an official Cisco Meraki Solutions Specialist. More info on the ECMS exam found
here.For information regarding all of Meraki's training offerings, be sure to check out the
Meraki Learning Hub.