It depends.
You can have rogue SSID's that are SSID's from other devices that are on the same physical network. And usually you don't want extra SSID's for performance and confusion avoidance reasons.
You can also have spoofs which are the same SSID's but from non Meraki devices or devices in a different Meraki network. If an attacker makes a spoof you need to be notified immediately because that is an attack in progress, however if it is a device under your control you can classify it as friendly.