How to download encrypted Backups of system data?
Helix allows administrators to generate and download encrypted backups of system data. Each backup is protected using a system-generated password, which is required to decrypt the file after download. Backups must be generated manually from the Control Panel and can include selected data tables based on user selection.
📍 Navigation
Control Panel → System Settings → Backups
➕ Generate an Encrypted Backup
Steps
-
Go to Control Panel → System Settings → Backups
-
Click + Add
-
Click Copy Password
-
This password is system-generated
-
It is required to decrypt the backup file
-
-
Review the on-screen notice related to encrypted backups
-
Select the data to include in the backup:
-
Use the search field to find specific items
-
Select items using checkboxes
-
-
Click Agree & Generate Backup
The backup generation process begins and the backup is added to the list once completed.
🔎 Selecting Data for Backup
While selecting data, the following options are available:
-
Search to filter items
-
Select visible
-
Invert visible
-
Clear
-
Cancel
These options help manage data selection before generating the backup.
📋 Backup List View
Once generated, backups appear in a list view.
From this list, you can:
-
View generated backups
-
Use pagination to browse older backups
-
Access actions using the ⋮ (three-dot) menu
⬇️ Download a Backup
Steps
-
Locate the required backup in the list
-
Click ⋮ (three dots)
-
Select Download
-
Use the previously copied password to decrypt the file after download
⚠️ Important Notes
-
Store the password securely
Save the system-generated password in a secure password manager. Without this password, the encrypted backup cannot be decrypted. -
Label backups clearly after download
Use clear naming in your storage to identify the backup’s scope and date (for example:2025-11-17-finance-ops). This helps confirm what data is covered. -
Avoid duplicate data selection
When generating backups for large datasets, use Select visible for the first pass and Invert visible for the second pass to ensure full coverage without duplication. -
Validate backups periodically
Perform test restores in a safe, non-production environment to confirm backup integrity and usability. -
Manage backup retention
Review and clean up older backups according to your organization’s data retention policy to avoid unnecessary storage buildup.