A cloud-based identity and access management service for securing user authentication and resource access
I did find a solution. Here are my notes. I hope this helps!
Troubleshot and Successfully Resolved Inability to Create New Cloud Sync Configuration in Entra: Located potential solution in that the account created (ADToAADSyncServiceAccount) when an AAD Cloud Sync server is initially registered needs to have an exception put in place for the conditional access policies requiring MFA on all accounts. Accessed EntraID > Protection > Conditional Access > Policies > and selected “Require MFA for internal users (admins not included) – Basic” policy. Selected Assignments > All users included and specific users excluded > and added “ADToAADSyncServiceAccount” to the list of excluded users. Reattempted creation of new Cloud Sync Agent configuration; !!SUCCCESS!!