This smells like an attempt to to by-pass on-premises MFA for Azure AD workload (such as Office 365). If so, bad idea. You'd better use Azure AD Conditional Access Policy to trigger MFA.
If that's not about that at all, let us know and we can dig into a technical solution.
Also, note that you can still use the "old" way to set Additional Authentication Rules in ADFS on Windows Server 2016. You will need to set the policy to null:
Set-AdfsRelyingPartyTrust -TargetName <Name of the Relaying Party Trust> -AccessControlPolicyName $null
And then modify the authorization rules from the ADFS console (when you set the policy to null and click on Edit Access Control Policy, it brings you the old Issuance Authorization Rules tab) and the additional authorization rules with PowerShell.