Hey, Jonas. Since I don't have all of your setup details, I'm going to just try and advise on the way it SHOULD be done (well, SHOULD according to MS, anyway!)
I went looking for some documentation on this, but didn't come up with it right away, going from memory the only role MS supports in the DMZ is the edge transport role on 2016. If you have a DMZ setup and want to publish Webmail to the outside world you need some kind of reverse proxy. Part of the reasoning I remember reading is a webmail server has to be a domain member and have a lot of ports open for exchange and domain communications. So rather than opening up all those ports that are needed, just open 443 on the proxy.
Microsoft has a 'free' one, that is call Web Application Proxy (WAP). It's just a role that can be installed on a 2012R2 and I think 2016 server. With this server in place the only L3 rule you need from DMZ to Internal network is 443 to be allowed to the servers you are setting up the proxy for (like RDS and Webmail maybe) and the ADFS server.
So the answer to what ports you need to open from DMZ to LAN depends on what is actually in your DMZ. Hopefully that helps.