Hi @Tyler Gervase ,
I see @Marti Peig has provided you the respective document to resolve the error but found you have some queries in resolving the issue. I would like to provide you additional information based on the errors provided. I see there is an error of AADSTS50079: Due to a configuration change made by your administrator, or because you moved to a new location, you must enroll in multi-factor authentication
which means there is conditional access policy which is requesting MFA for your AdSync cloud account. Since the account works non interactive authentication and will not be able to accomplish the MFA. In this situation kindly make sure to exclude your Cloud Service account. You can find the cloud service account of Entra connect in audit logs by filtering logs with Entra connect.
Once you find the service account, go to conditional access policy and click on "WhatIf
" and check the policies that are getting applied to the account and exclude accordingly.
I have also seen an error where it states about the credentials of the service account. Make sure you follow this document to ensure there is no password issues.
Here is the official document of troubleshooting sync service failed to start: https://learn.microsoft.com/en-us/troubleshoot/entra/entra-id/user-prov-sync/directory-sync-stop-register
Here are the permissions that are necessary for AD Sync Service account.
Make group policy changes if necessary, so that the AD Sync service account can log on locally, as a service, and as a batch job. Because a domain group policy takes precedence over a local group policy, you need to check the settings for both types of group policies.
- Select Start, enter gpedit.msc in the search box, and then press Enter to open the Local Group Policy Editor snap-in.
- In the console tree, under Computer Configuration, expand Windows Settings > Security Settings > Local Policies, and then select User Rights Assignment.
- Verify that the ADSync service account is added for the following policy settings:
- Allow log on locally
- Log on as a batch job
- For domain group policies, open an administrative command prompt.
- Run the following gpresult command, which generates a group policy report:
gpresult /H gpresult.htm
- Open the resulting group policy report (gpresult.htm).
- If User Rights Assignment settings are applied through any domain group policy object (GPO), use the Group Policy Management console (gpmc.msc) from a domain controller to take one of the following actions:
- Remove the following policy settings from the Winning GPO:
- Allow log on locally
- Log on as a batch job
- Log on as a service
- Update the Winning GPO to include the ADSync service account.
- If you made any changes to the local group policy or domain group policy, restart the computer to apply the changes.
If above steps doesn't help then you will have to open internet ports for AD connect server to connect with Azure endpoints on internet.Make group policy changes if necessary so that the ADSync service account can log on locally, as a service, and as a batch job. Because a domain group policy takes precedence over a local group policy, you need to check the settings for both types of group policies.
- Select Start, enter gpedit.msc in the search box, and then press Enter to open the Local Group Policy Editor snap-in.
- In the console tree, under Computer Configuration, expand Windows Settings > Security Settings > Local Policies, and then select User Rights Assignment.
- Verify that the ADSync service account is added for the following policy settings:
- Allow log on locally
- Log on as a batch job
- For domain group policies, open an administrative command prompt.
- Run the following gpresult command, which generates a group policy report:
gpresult /H gpresult.htm
- Open the resulting group policy report (gpresult.htm).
- If User Rights Assignment settings are applied through any domain group policy object (GPO), use the Group Policy Management console (gpmc.msc) from a domain controller to take one of the following actions:
- Remove the following policy settings from the Winning GPO:
- Allow log on locally
- Log on as a batch job
- Log on as a service
- Update the Winning GPO to include the ADSync service account.
- If you made any changes to the local group policy or domain group policy, restart the computer to apply the changes.
If none of the above help you in resolving the issue, kindly install the Azure Ad connect on new server which is domain joined and windows server 2019 or above version.
I hope this information is helpful. Please feel free to reach out if you have any further questions.