As you navigate through our apps and articles, you will stumble upon some terms and feature names that may not be clear for you at first. To help you out, we collected the most important Tresorit terminology here.
🏆 Pro tip: Use CTRL / cmd ⌘ + F to navigate the page efficiently!
Access Logs | A security setting on share links. After you enable access logs, Tresorit will list useful information such as the date, IP address, and platforms used to download the content you shared. |
Account | Your individual account that you can use to sign in to the Tresorit app. Should not be confused with your Subscription. |
Active Directory Connector | The AD Connector enables bigger companies and enterprises to manage Tresorit users securely within their domain networks. This feature is available by request only. |
Admin | Co-admins and Subscription Owners. They manage Business subscriptions. |
Admin Center | All team subscriptions are equipped with an Admin Center, where admins can manage users, billing, policies and custom branding. |
Advanced Control | An enhanced security measure that allows admins of the organization to delete user accounts, reset lost passwords and revoke lost or stolen devices in their Business Subscription. |
Bandwidth Limit Scheduler | You can customize bandwidth limit settings under the Network tab in Tresorit. Dedicate certain times of the day for syncing at full-speed or select time slots when you would like to limit Tresorit’s bandwidth usage. |
Co-Admin | They can manage users and policies in a Subscription, but don’t have access to billing details and Admin Center settings. |
Delete User | Subscription Owners can initiate an account deletion process for all users in the subscription. This action deletes the user’s account along with all owned tresors. |
Deleted File and Folder Recovery | When accidentally deleting a file or folder in Tresorit, you can easily recover it with just a click. This feature also helps you to restore your files in case of a ransomware attack. |
Direct File Open | With the Direct File Open feature, you can open and edit smaller files directly from your Tresorit app – even if the file is in a Tresorit Folder that’s not synced. |
Document Scanner | With Tresorit mobile apps, you can use your phone's camera to scan important documents. Tresorit will upload these snapshots directly to the cloud, ensuring that confidential documents are encrypted and secured immediately. |
Editor | A permission setting in shared tresors. They can read, edit, and delete files and folders in a shared tresor. |
FUSE | FUSE is a MacOS software package that creates a connection between Tresorit files and your Finder, giving you direct access to data stored in the cloud. After installing it on your Mac, you will be able to access useful Tresorit features like Direct File Open and Tresorit Drive. |
Invalid Characters | Depending on the operating system, some characters are prohibited to use in filenames. When a file contains invalid characters, you will see a notification in orange in your Tresorit client. |
Inviting Collaborators | A file-sharing method in Tresorit. If you share a tresor with others, the files will appear in their Tresorit folders as they do in yours. This option is only available for tresors, and invitees need to set up a Tresorit account before they can accept the invitation. |
Links Tab | The Links tab contains all share links from all of your tresors — here you can manage and oversee all shared links or delete the ones that already expired. |
Local Wipe | When you sign out from Tresorit, you have an option to delete all synced folders from the device. |
Manager | The default and highest level of permission in a shared tresor. They can share, read, edit, and delete files and folders in a shared tresor. |
Other Uploads | You can create Tresorit share links to files on your phone or desktop, even if they are not synced to Tresorit yet. These files will be uploaded to the cloud first, where you can access them later. This tresor is called Other Uploads. |
Permission | Permissions define whether members of a shared tresor can modify, delete, or re-share its content. |
Policy Template | Policies are sets of security measures varying by user groups. Users from one group will have the same set of privileges and a user can only belong to one template. |
Recents Tab | The Recents tab in your Tresorit app lists all user activity in tresors shared with you. Here you can overview all actions made by you or other collaborators. |
Remote Wipe | Remote wipe helps you keep control over your data when a device is lost or stolen. If you choose to remote wipe a device, all synced folders will be deleted from it the next time someone signs in to Tresorit. Anyone can use this feature on their own devices at any time, and with Advanced Control enabled, admins can also remote wipe user devices through Admin Center. |
Remove User | An action that permanently removes a user account from the Business Subscription and frees up a license that you can reassign to someone else. When you remove a user, you are only removing them from the subscription – they will be able to sign in to their account later and access locally stored data and shared tresors. |
Role | Roles define which users can see and modify subscription details like billing, policies and roles. |
Security Code | Security Code is a method to change your password by requesting a one-time authentication code through email. To use this feature, you will need to use a device where you are still signed in (either in a Tresorit app or in Web Access). |
Selective Sync | If you turn on selective sync in a tresor, you can define which subfolders should sync to your computer. |
Share Link | A file-sharing method in Tresorit. If you share content using this option, anyone who has the share link can access your files, even without a Tresorit account. This is available for tresors, folders and files. |
Subscription | Also known as your plan. Tresorit has 6 plans: Premium, Solo, Small Business, Business, Enterprise and Basic (free plan). |
Subscription Owner | Tresorit Business Subscriptions are administered by one person who has an extended set of rights – the Subscription Owner. They manage the billing and users, and can also put security measures in place to protect confidential company data. |
Suspend User | Temporarily bans users from signing in to their accounts. Co-admins and admins can suspend users. Since it is a temporary action, it doesn’t free up a license. |
Tresor | Secure, encrypted parent folders to your files. Any local folder on your computer can be turned into a tresor – no need to change your existing folder structure to sync files. |
Tresorit Drive | A feature that gives access to your Tresorit files directly through your computer’s file browser, regardless of whether they are synced or not. |
Tresorit Outlook Add-In | With Tresorit for Outlook, you can secure your attachments from your Outlook app. The attachment is encrypted directly on your device using Tresorit’s end-to-end zero-knowledge encryption. Then, the add-in inserts the share link to your email body, providing you with the same level of security as in-app sharing. |
Tresorit Path | Tresorit Path is a shareable access route to your files. All members of a shared tresor can use this feature to send files and subfolders to each other. |
Tresorit Send | Send is a standalone file sharing solution that uses Tresorit’s encrypted link sharing technology to guarantee the safety of shared data. |
Two-Step Verification | When two-step verification is enabled Tresorit will ask you to provide a verification code after you enter your password. You can receive this code from an authenticator app, text message, phone call or email. |
Viewer | The lowest level of permission in shared tresors. They can only read and download files and folders. |
Still have questions left? Drop us a line