Fact-checked by Grok 2 weeks ago

Session Manager Subsystem

The Session Manager Subsystem (smss.exe) is a critical core component of the Windows NT operating system family, serving as the initial user-mode process executed during system boot to initialize the environment and manage sessions. It is launched by the Windows after loading the registry hives and boot-start drivers, marking the transition from kernel-mode initialization to user-mode operations. Among its primary responsibilities, smss.exe initializes the session (Session 0), establishes essential environment variables and registry configurations, and loads and starts device drivers not designated as boot-start. It also spawns key subsystems, including the (csrss.exe) for handling console windows and the Windows Logon application (winlogon.exe) for user authentication, thereby facilitating the creation of user sessions and the overall startup sequence. As a protected process located in the C:\Windows\System32 directory, smss.exe cannot be terminated or restarted without a full , underscoring its foundational role in maintaining stability and security. In modern Windows versions, such as , it continues to manage session resources efficiently during startup, ensuring seamless progression to the .

Overview and Architecture

Definition and Primary Role

The Session Manager Subsystem (SMSS), implemented as the executable , serves as the initial user-mode process initiated by the after the loading of essential boot drivers during system startup. This process establishes the foundational user-mode environment, transitioning the system from kernel-level initialization to a fully operational state capable of supporting applications and services. SMSS's primary responsibilities encompass creating the initial system session (session 0), initializing core subsystems such as the Win32 subsystem by launching the (csrss.exe), and executing boot-time commands specified in the registry key HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute. It also configures system environment variables from the registry, creates paging files for management based on settings in HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PagingFiles, and maps devices (such as COM1, LPT ports, and drive letters) using symbolic links defined under HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\DOS Devices. These tasks ensure seamless integration of hardware abstractions and memory resources before higher-level components like Winlogon are invoked. In the broader context of Windows NT's hybrid kernel architecture, SMSS functions analogously to the process in operating systems, orchestrating early user-mode setup while remaining lightweight and terminating after completing its duties to minimize resource overhead.

Integration with Windows NT Kernel

The Session Manager Subsystem (SMSS) occupies a pivotal position within the Windows NT kernel architecture as a user-mode situated above the kernel's executive layer, serving as a trusted intermediary that bridges low-level kernel operations with higher-level user-mode environments. This placement enables SMSS to execute with high privileges while maintaining separation from kernel-mode components, ensuring stability and security during system initialization. As a native user-mode (smss.exe), it links exclusively to Ntdll.dll for invoking native system services, allowing it to interact safely with the executive services without direct kernel access. In terms of interaction flow, the kernel executive () launches SMSS as the inaugural user-mode process immediately following phase 1 of the boot sequence, passing control via the NtProcessStartup to commence user-mode initialization. Once active, SMSS coordinates the startup of essential user-mode components, including the (CSRSS.exe) for core support and Winlogon.exe for authentication handling in interactive sessions, utilizing asynchronous local procedure calls (ALPC) over ports like SmApiPort to facilitate communication. This orchestrated handoff establishes the foundational environment for subsequent subsystem loading, such as configuring the registry hive and files, all while adhering to the kernel's object manager for . SMSS primarily operates within Session 0, designated as the system session, where it spawns isolated user sessions to enforce security boundaries and prevent cross-session interference, a model enhanced by session isolation features introduced in . Running under the account, it inherits full administrative privileges from the kernel's boot context, including capabilities like SeCreatePagefilePrivilege for paging file creation and (TCB) access for namespace management, which collectively underpin the operating system's multi-session architecture. This privileged status, combined with its designation as a Protected Process Light (PPL) at the WinTcb-Lite level, safeguards SMSS from unauthorized interference, ensuring the integrity of session creation and subsystem bootstrapping.

Historical Development

Origins in Windows NT 3.1

The Session Manager Subsystem (SMSS), implemented as smss.exe, was developed as a core component of the operating system under the leadership of David N. Cutler, who initiated the NT project at in 1988. Cutler's design drew heavily from his prior experience at , incorporating influences from systems such as , I/O subsystems, and scheduling, while integrating Unix-inspired concepts like and management to support a portable, secure architecture. This foundational subsystem was engineered to facilitate the transition from kernel mode to user mode during boot, replacing the simpler boot mechanisms of earlier Windows versions like , and enabling a multi-user, secure environment suitable for enterprise and workstation use. In Windows NT 3.1, SMSS served as the first user-mode process launched by the NT kernel (ntoskrnl.exe) after the boot loader (ntldr), marking the start of Phase 1 system initialization. Its primary role involved basic session initialization, including setting up environment variables, opening page files as defined in the registry (e.g., HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PagingFiles), and executing early boot tasks like running autochk.exe for volume consistency checks. SMSS then launched essential subsystems, such as the Client/Server Runtime Subsystem (CSRSS.exe) to handle Win32 console operations and process support, and Winlogon.exe for user authentication and secure logon handling via mechanisms like Ctrl+Alt+Delete on the secure desktop. At this stage, SMSS did not support multi-session capabilities, focusing instead on single-session setup for the interactive window station (WinSta0) and desktops like Default and Winlogon. First shipped with on July 27, 1993, SMSS was integral to realizing the NT kernel's goals of portability across architectures (initially x86 and ) and a robust model based on access tokens and object descriptors. By coordinating the startup of environment subsystems and ensuring , it provided the groundwork for NT's client/server architecture, which emphasized in multi-user scenarios without the vulnerabilities of consumer-oriented Windows versions. This design choice underscored NT's departure from DOS-based roots, prioritizing stability and enterprise readiness from the outset.

Evolution Across Windows Versions

The Session Manager Subsystem (SMSS) originated in as the initial user-mode process responsible for establishing the core , providing a baseline for session handling in later releases. (1996) introduced Terminal Server as an add-on, enabling early remote multi-session capabilities and laying groundwork for native support. In , released in 2000, SMSS was updated to support Fast User Switching on client editions, enabling multiple concurrent user logons without full logoff, and introduced foundational multi-session capabilities on server editions through the integration of Terminal Services for remote access. , launched in 2007, marked a pivotal security-focused with the of Session 0 , which designates Session 0 exclusively for system services and non-interactive processes, while user logons occur in Sessions 1 and higher to mitigate risks from service-to-user interactions. To implement this separation, SMSS spawns a child instance in Session 0 that launches wininit.exe, shifting the hosting of critical services like the (services.exe) away from direct SMSS oversight. From in 2009 through and 10 up to 2015, SMSS underwent refinements to bolster support, including coordinated launches of the Local Security Authority Subsystem Service (lsass.exe) via wininit.exe for secure multi-session remote connections on both client and server platforms; these versions also incorporated boot-time optimizations in SMSS to accelerate system initialization. Windows 11, released in 2021, and Windows Server 2022 continued to use the established SMSS design, with the OS providing enhanced support for ARM64 architectures.

Boot-Time Initialization

Kernel Launch and Core Setup

Following the loading of boot-start drivers and the system registry hive by the Windows NT kernel, control is passed to the Session Manager Subsystem (SMSS) through the execution of smss.exe, initiating the user-mode phase of the boot process. This handover occurs after the kernel has established basic hardware abstraction and memory initialization, positioning SMSS as the first user-mode process to run. SMSS then parses configuration data from the registry, primarily the HKLM\SYSTEM\CurrentControlSet\Control\Session Manager key, to orchestrate early system preparation tasks essential for stability. Among its core responsibilities, SMSS creates and configures paging files (pagefile.sys) to support management, drawing settings from the HKLM\SYSTEM\CurrentControlSet\Control\Session Manager[Memory Management](/page/Memory_management) subkey to determine file sizes and locations based on available disk space and . During this phase, SMSS enables paging and checks the boot volume's paging file for any prior crash dumps, ensuring seamless memory operations as the system transitions to full functionality. It also establishes global environment variables, such as and , by reading and applying registry-defined values to provide a consistent base environment for subsequent processes. SMSS performs critical file system integrity checks by executing commands listed in the BootExecute registry value under HKLM\SYSTEM\CurrentControlSet\Control\Session Manager, which by default includes autocheck autochk * to invoke autochk.exe. This utility runs in raw mode on volumes—before file systems are fully mounted—to detect and repair inconsistencies from unclean shutdowns, guaranteeing without interfering with ongoing boot operations. Furthermore, SMSS processes pending file operations specified in the PendingFileRenameOperations multi-string registry value (also under HKLM\SYSTEM\CurrentControlSet\Control\Session Manager), executing deferred renames or deletions that were queued during , such as those required for software updates when files are locked. These initialization steps collectively establish a stable foundational state, including , environmental configuration, and readiness, prior to the startup of higher-level user-mode components like the (CSRSS).

Environment and Subsystem Startup

Following the initial core setup by the , the Session Manager Subsystem (SMSS) configures the runtime for the system session by loading device mappings from the registry. Specifically, it creates symbolic links for device names—such as CON, AUX, NUL, and PRN—defined in the HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\DOS Devices key, placing them under the \Global?? directory in the Object Manager namespace to ensure compatibility with legacy applications that rely on these conventions. Additionally, SMSS augments the by reading and applying system-wide variables from the HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment registry template, establishing session-specific settings like PATH and TEMP before any user-mode processes execute. SMSS then proceeds to subsystem startup, initializing the primary Win32 subsystem as the foundational environment for Windows applications. This involves loading the kernel-mode component win32k.sys for graphics and window management, the user-mode winsrv.dll for server-side Win32 services, and launching csrss.exe (Client/Server Runtime Subsystem) as the primary user-mode process to handle console operations, thread management, and API translations. If additional subsystems are registered in the HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\SubSystems key—such as the POSIX subsystem (psxss.exe) in earlier Windows NT versions—SMSS launches them to provide compatibility layers for older or Unix-like applications, ensuring these environments are operational prior to user logon. Prior to subsystem initialization, SMSS executes boot-time commands specified in the BootExecute registry value under HKLM\SYSTEM\CurrentControlSet\Control\Session Manager, running them synchronously using native kernel APIs to perform critical setup tasks. A representative example is autoconv.exe, which invokes convert.exe to non-destructively upgrade FAT volumes to NTFS during initial boots after installation, preserving data while enabling advanced file system features. In Windows versions prior to Vista, SMSS additionally launched winlogon.exe, which in turn initialized the Service Control Manager (services.exe) to start core system services; starting with Vista, this responsibility shifted to wininit.exe for improved isolation and boot performance. This phased approach guarantees that the full environment, including compatibility mechanisms, is stable before transitioning to user sessions.

Session Management

User Session Creation

The Session Manager Subsystem (SMSS) is invoked by Winlogon after successful user authentication during the logon process to establish a new user session. This trigger occurs once credentials are validated by the Local Security Authority Subsystem Service (LSASS), generating an for the user. SMSS then allocates a unique for the new session, such as Session 1 for the first interactive user logon, ensuring isolation from existing sessions through structures like the executive process object (EPROCESS) and kernel process object (KPROCESS). The creation process begins by duplicating key elements from Session 0, including the process environment block (PEB), standard handles, and initial registry like the SOFTWARE hive, to provide a baseline environment for the new session. SMSS subsequently launches a dedicated instance of the (CSRSS) for the session, which handles subsystem services, window management, and objects. It also establishes an isolated window station and , typically winsta0 for the interactive , secured with session-specific security identifiers () and integrity levels such as Medium to enforce access controls via the object manager. Winlogon coordinates this setup and uses the CreateProcessAsUser to initiate session-specific processes, such as the user (explorer.exe), running in the context of the new . Client editions of Windows support multiple concurrent user sessions through this mechanism, limited primarily by available system resources such as memory and CPU, while server editions allow an unlimited number depending on hardware and licensing. From onward, Session 0 isolation confines system services to a non-interactive environment, preventing interference with user sessions created in this manner. This session creation model underpins Fast User Switching, permitting rapid transitions between user accounts by suspending rather than terminating inactive sessions, thereby maintaining isolation without requiring a full logoff.

Multi-Session Handling

In environments, the Session Manager Subsystem (SMSS) enables support for multiple concurrent interactive sessions through its integration with (RDS), the successor to Terminal Services. Upon user connection, SMSS spawns a dedicated instance for each new session, assigning a unique session ID to facilitate independent user environments while the initial session 0 handles system services. This capability allows servers to host numerous remote users simultaneously, with SMSS coordinating the initialization of session-specific subsystems like the (CSRSS). SMSS integrates closely with the Local Session Manager (LSM) service, which it launches during boot-time initialization in session 0 via the Windows Initialization process (Wininit). LSM is responsible for creating, destroying, configuring, and enumerating sessions on the terminal server using (RPC)-based interfaces, while SMSS oversees the overall session lifecycle, including logoff procedures triggered by Winlogon termination. This collaboration enables session state tracking and switching, ensuring smooth transitions between active sessions without disrupting others. Windows Server 2019 and 2022 support a theoretical maximum of 65,535 concurrent connections across and Datacenter editions, constrained by hardware resources, Client Access Licenses (CALs), and configuration. Limits on sessions per user, such as enforcing a single session, are configurable via registry keys like fSingleSessionPerUser under HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server, set to 1 by default to restrict multiple logons from the same account. In deployments, these limits apply per , allowing scaled multi-session hosting within licensed boundaries. To mitigate in multi-session scenarios, SMSS enforces by tagging processes with their assigned and maintaining per-session handle tables for objects such as desktops, window stations, and clipboards. This design prevents cross-session access to sensitive data or resources, enhancing and in shared environments.

Runtime Operations

Process Monitoring

The Session Manager Subsystem (SMSS) performs ongoing surveillance of critical session-related processes during to maintain system . It specifically monitors instances of winlogon.exe, the Windows logon manager, and csrss.exe, the , by maintaining open to these processes and waiting indefinitely on their termination signals, particularly for the session 0 instances. This monitoring detects unexpected failures, hangs, or crashes in these processes, which are essential for user session integrity and subsystem functionality. SMSS employs the NtWaitForSingleObject API (equivalent to WaitForSingleObject in user mode) on the process handles to implement this surveillance, blocking until a monitored process signals completion or failure. Upon detecting an issue, such as a process exit due to crash, SMSS logs relevant events to the Windows Event Viewer under the System log, including error codes and timestamps for diagnostic purposes. In pre-Vista versions of Windows, SMSS could attempt to restart failed instances of csrss.exe or winlogon.exe to recover session stability, though such restarts were limited to avoid recursive failures. In and later versions, SMSS's role in handling interactive sessions has been adjusted due to Session 0 isolation for non-interactive services, with monitoring enhanced through kernel-level protections like Protected Process Light. Instead, it prioritizes session integrity checks, such as verifying process liveness and triggering system-wide responses like reboots if critical failures occur in csrss.exe, which now directly cause a (BSOD) due to its protected status. As of (2025), SMSS continues these operations with enhanced security features. This evolution ensures overall system resilience while minimizing SMSS's active intervention in favor of kernel-level protections.

Shutdown and Termination

The Session Manager Subsystem (SMSS) plays a critical role in orchestrating the orderly termination of sessions and subsystems during system shutdown, ensuring that user data is preserved and resources are released properly. When a shutdown is initiated—typically through user action, application call, or system event—Winlogon receives the request via the InitiateSystemShutdownEx API and propagates it to SMSS over an Advanced Local Procedure Call (ALPC) port. SMSS then begins the termination sequence by notifying subsystem processes, such as the Client/Server Runtime Subsystem (CSRSS) and, in pre-Windows Vista versions, the POSIX subsystem (PSXSS), across all active sessions to terminate their associated client processes in an orderly manner. This step prioritizes user sessions, allowing applications to save data and close gracefully before forcing termination if necessary. Following session termination, SMSS unloads subsystems in the reverse order of their initialization to maintain dependency integrity, closing ALPC ports used for to prevent resource leaks. In and later versions, which introduced Session 0 isolation for services, SMSS coordinates the shutdown of interactive user sessions first—allowing applications to save data and close gracefully—followed by Session 0 processes, such as services managed by the , ensuring user activities are handled before system services are stopped. For emergency shutdowns, such as those triggered by the Secure Attention Sequence (Ctrl+Alt+Del), Winlogon handles the initial user prompt and escalation, passing control to SMSS for the same termination flow to minimize abrupt halts. Once all subsystems are unloaded, SMSS notifies the by invoking the NtShutdownSystem native , which queues pending operations like flushing the registry, caching changes, and shutting down drivers to prevent . This kernel-level coordination powers off the system or reboots as specified, with SMSS self-terminating as the final process to ensure no orphaned components remain. By enforcing this structured sequence, SMSS mitigates risks of corruption or incomplete writes during shutdown.

Implementation Details

Core Components and Executables

The Session Manager Subsystem (SMSS) is primarily embodied in the smss.exe, a core component residing in the %SystemRoot%\System32 of Windows NT-based operating systems. This serves as the initial user-mode launched by the during system , handling foundational session initialization tasks. Typically around 50 KB in size across various Windows versions, such as 50,688 bytes in many installations, smss.exe is implemented as a native application written in C using the (NT APIs). Designed for utmost reliability in the critical early boot phase, smss.exe adopts a minimalist architecture as a static binary with no dependencies on the C runtime library or higher-level user-mode DLLs beyond ntdll.dll, which provides direct access to kernel system calls. This approach avoids potential failure points from external libraries, enabling self-contained operation when it is the sole user-mode process active. The executable is digitally signed by Microsoft to verify its authenticity and integrity as a protected system file. In terms of interactions with other core executables, smss.exe interfaces directly with the kernel image for low-level operations and spawns key subsystems, including csrss.exe to host the Windows Client/Server Runtime Subsystem processes and wininit.exe (introduced in Windows Vista) to launch services in Session 0. For user sessions, the primary smss.exe creates transient child processes of itself, each running in the new to initialize the environment by spawning session-specific instances of csrss.exe and winlogon.exe, after which the child processes terminate. These components form the foundational layer for subsequent user sessions, with smss.exe employing distinct code paths to differentiate between boot-time initialization in Session 0 and the creation of interactive user sessions.

Communication Mechanisms

The Session Manager Subsystem (SMSS) primarily employs Advanced Local Procedure Call (ALPC) as its core communication mechanism for interacting with other components, particularly through the dedicated ALPC port named SmSsWinStationApiPort. This port facilitates session-related API calls, enabling the Local Session Manager service (lsm.exe) to send requests to SMSS for initiating new user sessions, such as spawning instances of the (csrss.exe) and Winlogon processes. The ALPC protocol supports efficient, kernel-mediated between processes, with SMSS hosting the in its primary (smss.exe) to handle these interactions during runtime. In earlier Windows versions prior to , SMSS relied on the legacy Local Procedure Call (LPC) mechanism for similar inter-process communications, which was synchronous and packet-based but has since been deprecated in favor of ALPC's asynchronous capabilities. Complementing these, SMSS performs registry queries using Native API functions from the NtRegistry family (e.g., NtCreateKey and NtOpenKey) to access configuration data in hives like HKLM\SYSTEM\CurrentControlSet\Control\Session Manager, ensuring secure and isolated reads without direct exposure. For and handling, SMSS utilizes APIs such as NtWaitForSingleObject to monitor waitable objects like events, allowing it to respond to subsystem signals during boot and session transitions. To enhance , SMSS configures its ALPC ports as protected server endpoints, applying security descriptors and lists (ACLs) that restrict connections to privileged processes, thereby minimizing unauthorized risks. This port, including SmSsWinStationApiPort, is established early in the boot sequence by the initial SMSS instance, serving as a point for subsystem initialization and ongoing coordination. Overall, these mechanisms enable asynchronous, secure messaging across isolated address spaces without relying on , which significantly reduces the potential by enforcing strict isolation and validation at the level.

References

  1. [1]
    Windows boot issues troubleshooting - Microsoft Learn
    Apr 28, 2025 · The kernel passes control to the session manager process (Smss.exe) which initializes the system session, and loads and starts the devices and ...
  2. [2]
    Critical System Services - Win32 apps - Microsoft Learn
    Mar 15, 2022 · Critical system services include smss.exe, csrss.exe, wininit.exe, logonui.exe, lsass.exe, services.exe, winlogon.exe, System, svchost.exe with RPCSS, and ...
  3. [3]
    Process list for fresh Windows 11 install - Microsoft Learn
    Sep 25, 2024 · smss.exe (Session Manager Subsystem): Manages sessions and system resources during startup. csrss.exe (Client/Server Runtime Subsystem): ...
  4. [4]
    Inside Native Applications - Sysinternals - Microsoft Learn
    Nov 1, 2006 · At this point in the boot sequence Session Manager (smss.exe) is getting NT's user-mode environment off-the-ground and no other programs are ...
  5. [5]
    Troubleshooting Windows Startup and Shutdown Problems
    Sep 15, 2012 · This chapter, from Windows Internals, Part 2, 6th Edition, describes the steps required to boot Windows and the options that can affect system startup.
  6. [6]
    The page file size may become alternately too small or too large ...
    If there is not enough free disk space, the Smss.exe process deletes the existing page file. Then, the Smss.exe process tries to re-create the page file.Missing: paging | Show results with:paging
  7. [7]
    None
    Below is a merged summary of the Session Manager Subsystem (SMSS) from *Windows Internals, 7th Edition, Part 1*, consolidating all information from the provided segments into a comprehensive response. To retain maximum detail and ensure clarity, I will use a structured format with sections and, where applicable, a table in CSV format to summarize key attributes across the summaries. This approach avoids redundancy while preserving all unique details.
  8. [8]
    [PDF] Custer_Inside_Windows_NT_19...
    Dave Cutler, director of the Windows NT development group and pri- mary architect of the system, designed and implemented the NT kernel. Dave, a former ...Missing: origins | Show results with:origins
  9. [9]
    [PDF] Microsoft Windows Internals, Fourth Edition
    ... David Solomon, David Cutler, and Mark Russinovich. I ... We originally thought we could produce the first Windows NT system in a little over two years.
  10. [10]
    Service Changes for Windows Vista - Win32 apps | Microsoft Learn
    Jan 7, 2021 · This is more efficient than calling the QueryServiceStatusEx function in a loop to poll for status. Session 0 Isolation, Services have always ...
  11. [11]
    [PDF] Windows® Internals, Fifth Edition - Pearsoncmg.com
    Aug 26, 2011 · Windows Internals, Fifth Edition is intended for advanced computer professionals (both ... Session 0 Isolation, 297–300 settings, table of ...
  12. [12]
    OS crash dump vs page file - Microsoft Q&A
    Nov 11, 2022 · When SMSS.EXE enables paging during the boot process, the system examines the boot volume's page file to see if there is a crash dump present."Windows created a temporary paging file" pop up when I start my ...windows 10 OS crash dump drive location - Microsoft Q&AMore results from learn.microsoft.com
  13. [13]
    MoveFileExA function (winbase.h) - Win32 apps | Microsoft Learn
    Jun 1, 2023 · ... PendingFileRenameOperations. This registry value is of type REG_MULTI_SZ. Each rename operation stores one of the following NULL-terminated ...
  14. [14]
    FGA: The Windows NT 6 boot process
    The kernel finally invokes the first user process, the so-called Session Manager Subsystem (SMSS). ... This split is called Session 0 Isolation by Microsoft.
  15. [15]
    System Architecture - Windows Internals, Sixth Edition, Part 1 (2012)
    System Architecture - Windows Internals, Sixth Edition, Part 1 - you get critical insider perspectives on how Windows operates.<|control11|><|separator|>
  16. [16]
    Windows Internals Book - Sysinternals - Microsoft Learn
    Sep 15, 2022 · Windows Internals 7th edition (Part 1) covers the architecture and core internals of Windows 10 and Windows Server 2016.Missing: paging | Show results with:paging
  17. [17]
    Debugging user-mode BootExecute native applications with kd
    Jul 26, 2008 · Alex Ionescu, most recently contributing to the eagerly awaited 5th edition of the Windows Internals ... AutoChk native BootExecute application ...
  18. [18]
    Windows NT startup process - Anvir Task Manager
    Before any files are opened, Autochk is started by smss.exe. Autochk mounts all drives and checks them one at a time whether they were not shut down cleanly ...
  19. [19]
    [PDF] Sample Chapters from Windows Internals, Sixth Edition, Part 1
    ... kernel process structure. Page 16. 362 Windows Internals, Sixth Edition, Part 1 ... implemented for the benefit of the Session Manager (SMSS) when initializing a ...
  20. [20]
    Terminal Server startup, connection, and application - Microsoft Learn
    Jan 15, 2025 · This article describes the initialization process of a Terminal Server and describes what occurs when a user connects to the server and runs an application.<|control11|><|separator|>
  21. [21]
    Client Logon Sessions - Win32 apps - Microsoft Learn
    The LogonUser function starts a new logon session and ... CreateProcessAsUser function to create a process that runs in the security context of the client.
  22. [22]
    CreateProcessAsUserA function (processthreadsapi.h) - Win32 apps
    Feb 9, 2023 · Creates a new process and its primary thread. The new process runs in the security context of the user represented by the specified token.
  23. [23]
    [MS-TSTS]: Overview - Microsoft Learn
    May 23, 2025 · Local Session Manager (LSM) Session: These calls collect information, and control and configure sessions running on the terminal server. Local ...Missing: SMSS | Show results with:SMSS
  24. [24]
    Comparison of locks and limits in Windows Server - Microsoft Learn
    Jun 27, 2025 · This article provides a side-by-side comparison of key operating system locks and limits across supported Windows Server editions.Missing: client | Show results with:client
  25. [25]
    Limti rdp session per user to one Windows Server 2019
    May 18, 2020 · User tried limiting RDP sessions via GPO and registry, but multiple sessions still possible on a standalone Windows Server 2019 RDSH.Remote desktop connection limitation to one session onlyRDP more than two Simultaneous Access Limitations to Windows ...More results from learn.microsoft.com
  26. [26]
    FGA: The Windows NT 6 shutdown process
    Finally, WINLOGON tells the Session Manager Subsystem (SMSS) to shut the system down. It does this by calling sending a shutdown request to the SMSS's LPC port.The Rôle Of Exitwindowsex() · How Users And Applications... · Winlogon's Response To A...
  27. [27]
    Troubleshooting Windows Startup and Shutdown Problems
    Sep 15, 2012 · If the option to clear the paging file at shutdown is enabled, the memory manager clears the paging file at this time. The I/O manager is ...
  28. [28]
    smss.exe Windows process - What is it? - Neuber software
    Rating 3.0 (341) This is the session manager subsystem, which is responsible for starting the user session. This process is initiated by the main system thread.
  29. [29]
    All about smss.exe (Windows Session Manager) - File.Info
    Smss.exe is found in the C:\Windows\System32 directory. Frequently occurring are file sizes such as 50,688 bytes (56% of all these files), 69,632 bytes as well ...
  30. [30]
    Minimal Executables - Pavel Yosifovich
    Mar 16, 2023 · Normally, native applications are built by Microsoft only. Examples include Smss.exe (the session manager), CSrss.exe (the Windows subsystem ...
  31. [31]
    Microsoft Security Bulletin MS13-102 - Important
    Beginning with Windows Vista, the use of LPC was deprecated by a newer mechanism called Asynchronous LPC (ALPC). Note that Microsoft does not recommend the use ...