For DOS attacks you better use DOS and BOT protection profiles as most DOS attacks come from Bots, so the Bot profile will block the Bots and the DOS profile will stop the DOS attack if the Bot profile did not manage to handle the Bot detections or the DOS attack commes from human farms that do DOS attacks. Better use the DOS profile with latency detection as it generates less false positives.
https://techdocs.f5.com/en-us/bigip-14-1-0/big-ip-asm-implementations-14-1-0/preventing-dos-attacks-on-applications.html
https://my.f5.com/manage/s/article/K42323285
For slow loris just use HTTP profile on the VIP as F5 has native protection for such attacks https://my.f5.com/manage/s/article/K10260
For blocking attackers that use scanners and generate many web attacks review the session tracking option in the AWAF that can block user ip addresses or device ID if they generate too many violations:
https://my.f5.com/manage/s/article/K02212345
I suggest to read the F5 AWAF operations to be able to effectively utilize the F5 WAF options:
https://my.f5.com/manage/s/article/K85426947