Which sync account did you exclude from MFA policies? If it cant create it, then the new one using the name of the new server shouldnt be in Azure.
Entra ID Connect failing to create synchronization account
A customer of ours had AAD Connect setup and working fine until one day it didn't. Not sure what happened, but probably a password change without following the correct process of destroying the encryption keys. I am now trying to install and configure aad connect on a different server and keep running into the "Unable to create the synchronization service account for Microsoft Entra ID..." I have made sure that the cloud AD Connect account is not in any conditional access policies, removed from legacy MFA policies, removed from the registration group, and I have the permissions assigned to the service account. Here is the error in the logs: "Microsoft.Azure.ActiveDirectory.Synchronization.ProvisioningWebServiceAdapter.AzureADServiceAccountException: Unable to create the synchronization service account for Microsoft Entra ID. Retrying this operation may help resolve the issue. ---> Microsoft.Identity.Client.MsalUiRequiredException: AADSTS50079: Due to a configuration change made by your administrator, or because you moved to a new location, you must enroll in multi-factor authentication to access '00000002-0000-0000-c000-000000000000'. Trace ID: 2794fdcd-2b1e-4bb2-af55-555267e53800 Correlation ID: dfb9f1ed-8ed6-4368-9c44-ce63e673513e Timestamp: 2024-11-15 19:38:26Z"
And Azure support is not responding to my inquiry. Any help would be appreciated.