Hi @Wrandall , we typically shut down all unused ports and place them into a non-routed vlan to stop anyone connecting devices into a network that isn’t authorised to do so.
You also have other options such as Radius authentication for devices and users that are authorised to be on the network. Anything that shouldn’t connect into placed again into either a guest vlan or de-authorised.
Also look at Cisco ISE.
Darren OConnor | doconnor@resalire.co.uk
https://www.linkedin.com/in/darrenoconnor/
I'm not an employee of Cisco/Meraki. My posts are based on Meraki best practice and what has worked for me in the field.