The DCSync attack simulates the behavior of a Domain Controller and asks other Domain Controllers to replicate information using the Directory Replication Service Remote Protocol (MS-DRSR). Because MS-DRSR is a valid and necessary function of Active Directory, it cannot be turned off or disabled.
By default only Domain Admins, Enterprise Admins, Administrators, and Domain Controllers groups have the required privileges (Replicating Directory Changes, Replicating Directory Changes All and Replicating Directory Changes in Filtered Set).
Enumeration
With PowerView (a PowerSploit script and there are two versions: Old and New) enumerate for users with the required rights.
[-just-dc-user <USERNAME>] # To get only of that user[-pwd-last-set] # To see when each account's password was last changed[-just-dc-ntlm] # Only NTLM hash[-user-status] # check if a user is disabled[-history] # To dump password history, may be helpful for offline password cracking