The claim rule to send the claim expiry will be working as long as the user used FBA or WH4B to authenticate (irrespective of the version of AD). This is just for notification in some applications (Exchange Online only as far I as recall). This is a feature to allow notification, it does not help or impact the lifetime of the user's token.
By default, Azure AD Connect is synchronizing the pwdLastSet attribute of the users. So Azure AD knows when a password is supposed to expire. If you do not synchronize the attribute (because you customized the default rules - bad idea to start with), then the maximum age for token refresh is limited to 12 hours.
Also, there is an endpoint in ADFS that can be used for users with an expired password (or with an account for which the box "User must change password at next logon" is checked). It is the URL https://......../adfs/portal/updatepassword. It is disabled by default and needs to be enabled. It does not help all the time though. But it does exist.