It honestly depends on what the alert is and why you have it enabled. Specific to Block ACK, it's very suceptible to clients with bad driver support, or when loads of clients have low SNR. From a WIDS perspective, the threat vector is VERY low (any high security concious customers should be using dot1x to which this attack is only a DoS anyway, akin to generating tons of noise targeted at one client).
So Block ACK, like many other signatures, requires a certain level of 'baselining' your environment first, then adjusting the triggers and thresholds in the controller so that the normal background noise of WIDS alerts is ignored and if there's an 'event' such that the triggers exceeds your modified thresholds, then you may or may not have something to investigate (though if you have an influx of new devices or clients are moving into low coverage areas, it might just be your new 'normal'). Some signatures, if seen, are actionable immediately, others may be trend or environmental without being a 'new threat'. As you may have found out, you can easily overload yourself with things that sound bad that turn out to be nascent, or are just 'normal noise'.
After Atmosphere, I will be writing up a WIDS VRD for AOS, Instant, and AirWave. I have all the moving parts, just not the time to sit and pound it all out, but I would expect the April time frame to expect it. It should have common vernacular descriptions of the signatures, a chart with best practices and recommendations based on your vertical, etc.