ADOM is an administrative domain, or a logical grouping of firewalls, you would, for single vdom firewalls typically have 1 firewall to an adom.
If you are a single enterprise, you could have one ADOM, or if you want to split up by business unit you can, its up to you.
As for policy management, you would have a global policy for standard configuration items that would apply to all firewalls such as:
standard acls
standard global firewall config items
standard connectors (TACACS, LDAP, radius, etc)
Standard AV, Web Profiles
Any enterprise or msp wide firewall policies
This would be the header or footer policies applied uniform to all 150. You would then define your local policy package that applies to only that firewall, e.g. site specific firewall policies, acls, objects, etc.
In general some operational discipline is needed for a team to effectively use FortiManager. Its a great tool, but the team should make as much changes FMGR side and push to the firewall, vs making firewall local changes, and having to import the config and have policy package conflicts.
The goal is central management, you can define in one location your general security policies, and push them to your appliances, as well as have a single reference for per-firewall configurations.
For multi-vdom firewalls, VDOM -> ADOM mapping is possible as well.
-Rob