Topic Last Modified: 2008-10-15

The Microsoft Exchange Analyzer Tool reads the following registry branch to determine whether the Disable Session Limit registry value is present and configured to anything other than a value of 0:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MSexchangeIS\ParametersSystem

If the Exchange Analyzer finds the Disable Session Limit registry value present and configured to have a value other than 0, a warning message is displayed.

This warning means that the Exchange Server 2003 Service Pack 1 (SP1) or later versions default MAPI session limit has been disabled.

Every time that a MAPI client or application opens a session on a computer that is running Microsoft Exchange, it causes the Microsoft Exchange Information Store service (store.exe) to consume a small amount of physical memory.

To prevent MAPI client sessions from causing the Exchange Store service to allocate excessive memory, versions Exchange Server 2003 SP1 and later versions impose a restriction on the number of permitted MAPI sessions per user. By default, the maximum number of permitted MAPI sessions per user is set to a hexadecimal value of 0x20 (decimal value of 32) for Exchange 2003 SP1 or later versions.

To address this warning, set the value of the Disable Session Limit registry entry to 0, or delete the entry.

Setting the value for the Disable Session Limit registry entry to 0, or deleting it, may cause Event ID 9646 events to be logged in the application event log of the Exchange server. This is expected behavior and indicates excessive MAPI sessions by one or more client applications.

We recommend that, instead of disabling or elevating the default per user MAPI session limit, the underlying network or application issues causing the excessive sessions per user be addressed. The cause of these issues might include, but are not limited to, the following:

If the Disable Session Limit registry value was intentionally enabled to allow service accounts to open more sessions because of application requirements, consider using the workaround described for those accounts in the previously mentioned Microsoft Knowledge Base article 842022. The workaround should be used sparingly to avoid out of memory or virtual memory fragmentation issues.

Note:
This article contains information about editing the registry. Before you edit the registry, make sure you understand how to restore the registry if a problem occurs. For information about how to restore the registry, see the "Restore the Registry" Help topic in Regedit.exe or Regedt32.exe.
To correct this warning by setting the value for the Disable Session Limit key to 0
  1. Open a registry editor, such as Regedit.exe or Regedt32.exe

  2. Navigate to: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MSexchangeIS\ParametersSystem

  3. Right-click the Disable Session Limit registry value and then click Modify.

  4. In the Value data box, type 0, and then click OK.

  5. Close Registry Editor and restart the Microsoft Exchange Information Store service for the change to take effect.

To correct this warning by deleting the Disable Session Limit key
  1. Open a registry editor, such as Regedit.exe or Regedt32.exe

  2. Navigate to: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MSexchangeIS\ParametersSystem

  3. Delete the Disable Session Limit registry value.

  4. Close Registry Editor and restart the Microsoft Exchange Information Store service for the change to take effect.

Before you edit the registry, and for more information about how to edit the registry, see Microsoft Knowledge Base article 256986, "Windows registry information for advanced users" (http://go.microsoft.com/fwlink/?linkid=3052&kbid=256986).

For more information about this issue, see the following Microsoft Exchange resources:

For more information about the TCP/IP KeepAliveTime value, see Microsoft Knowledge Base article 324270, "How to harden the TCP/IP stack against denial of service attacks in Windows Server 2003" (http://go.microsoft.com/fwlink/?linkid=3052&kbid=324270).