Definition

Virtual Machine Management Service

Contributor(s): Ryann Burnett

Virtual Machine Management Service, also known as VMMS or vmms.exe, is the main module in Microsoft Windows operating system that controls all aspects of Hyper-V server virtualization. Virtual Machine Management Service is a core hypervisor element that runs under the system account, which has the same privileges as administrator accounts.

In terms of architecture, Hyper-V first implements a parent partition, which runs the Virtual Machine Management Service. Then, Virtual Machine Management Service uses the submodules for virtual machine deployment and management. Virtual Machine Management Service uses several submodules, including Windows Management Instrumentation Provider; Hyper-V Volume Shadow Copy Service Writer; Virtual Machine, Worker Process and Snapshot Managers; Single Port Listener for Remote Desktop Protocol and Cluster Resource Control.

VMMS can timeout or shut down due to various virtual machine settings and actions. When troubleshooting, check the event ID to see how to resolve the problem. For example, "event ID 2000: could not register service connection point" is resolved by restarting Virtual Machine Management Service using the Service Manager.

This was last updated in March 2017

Continue Reading About Virtual Machine Management Service

Dig Deeper on Microsoft Hyper-V management

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

What are your best practices for troubleshooting Virtual Machine Management Service issues?
Cancel

-ADS BY GOOGLE

Dateiendungen und Dateiformate

Gesponsert von:

SearchVMware

SearchWindowsServer

SearchCloudComputing

SearchVirtualDesktop

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

Close