Monitoring & Operations

Upgrading Plans

How to upgrade from Trial to Professional or Enterprise, including the export-then-import migration workflow.


Upgrading VaultGuard360 from Trial to Professional, or from Professional to Enterprise, deploys a new Azure Managed Application in a new resource group. Configuration is not migrated automatically. Use the built-in export/import tool to transfer your settings to the new deployment.


Plan Comparison

FeatureTrialProfessionalEnterprise
PriceFree (14 days)$499/month$1,499/month
Subscriptions1530Unlimited
Items tracked2002,000Unlimited
Email notificationsYesYesYes
Webhook integrationsYesYesYes
Team routingYesYesYes
Custom email domainYesYesYes
Private EndpointsNoNoYes
VNet integrationNoNoYes
AMPLS (Azure Monitor)NoNoYes
SLANone99.5%99.5%

Note: Trial includes the full Professional feature set. There are no restricted features during the trial — you are evaluating the same product you would purchase.


Why Upgrade Requires a New Deployment

VaultGuard360 is deployed as an Azure Managed Application. Each tier is a separate Marketplace offer plan with its own ARM template and managed resource group configuration. The Azure Marketplace model does not support in-place plan upgrades — a new deployment is required.

This also means that scan history and audit logs stored in the Trial deployment's Table Storage are not migrated to the new deployment. Only configuration (thresholds, routing rules, email settings) can be transferred using the export/import tool.


Step 1: Export Configuration from Your Current Deployment

Before upgrading, export your current configuration. This step works even after a trial has expired.

From the Dashboard (if still active):

  1. Open the VaultGuard360 dashboard
  2. Navigate to Settings → Export Configuration
  3. Save the downloaded JSON file

From the API (works after trial expiry):

curl -s https://<your-current-function-app>.azurewebsites.net/api/export \
  -H "Authorization: Bearer <your-token>" \
  -o vaultguard360-config.json

The export includes routing rules, thresholds, reminder mode, and email provider settings. Webhook URLs, secrets, and SMTP credentials are excluded and must be re-entered after importing.


Step 2: Subscribe via Azure Marketplace

  1. Go to the Azure Marketplace listing for VaultGuard360
  2. Select Professional ($499/month) or Enterprise ($1,499/month)
  3. Complete the subscription purchase
  4. You will receive a confirmation email with deployment instructions

Step 3: Deploy the Managed Application

  1. In the Azure portal, navigate to Marketplace → My purchases
  2. Click Deploy on your VaultGuard360 subscription
  3. Complete the deployment wizard:
    • Select or create a resource group
    • Choose your Azure region
    • Configure identity settings (user-assigned managed identity)
    • For Enterprise: configure VNet, subnet, and private endpoint settings
  4. Wait for deployment to complete (approximately 5–10 minutes)

Step 4: Assign RBAC Roles on the New Deployment

The new deployment's managed identity needs the Key Vault Reader role on each subscription you want to monitor. This is the same setup as the original Trial deployment.

# Get the principal ID of the new managed identity
PRINCIPAL_ID=$(az identity show \
  --name id-vaultguard360 \
  --resource-group <new-managed-rg> \
  --query principalId -o tsv)

# Assign Key Vault Reader at subscription scope
az role assignment create \
  --assignee $PRINCIPAL_ID \
  --role "Key Vault Reader" \
  --scope /subscriptions/<subscription-id>

Note: Role assignment propagation can take 5–10 minutes. Scans that run before propagation completes will show missing vaults.


Step 5: Import Configuration

From the Dashboard:

  1. Open the new VaultGuard360 dashboard
  2. Navigate to Settings → Import Configuration
  3. Upload the JSON file from Step 1

From the API:

curl -s https://<your-new-function-app>.azurewebsites.net/api/import \
  -X POST \
  -H "Authorization: Bearer <your-token>" \
  -H "Content-Type: application/json" \
  -d @vaultguard360-config.json

Step 6: Reconfigure Secrets and Credentials

The following items are excluded from the export for security and must be re-entered manually:

ItemWhere to configure
Webhook URLs and secretsNotifications → Webhooks
Teams webhook URLNotifications → Teams Webhook
Per-route webhook URLsTeam Routing (edit each route)
SMTP password / app passwordEmail Configuration
Custom email sender domainCustom Domain (re-verify DNS)

Step 7: Verify and Test

  1. Check /api/health or the dashboard for deployment status
  2. Click Run Scan Now to trigger a manual scan
  3. Verify subscriptions and Key Vaults appear in scan results
  4. Navigate to Email Setup → Test Connection and confirm test email delivery
  5. Test each webhook channel using the Test button in Notifications

Known Limitations

  • Scan history is not migrated. The new deployment starts with an empty scan history. Historical trend data from the Trial deployment is not available in the new deployment.
  • Audit logs are not migrated. Audit logs are tied to the Table Storage account in the original deployment's managed resource group. Keep the Trial deployment running (or export logs via the Azure portal) if you need to retain historical audit evidence.
  • Custom email domain requires re-verification. The new deployment has a new ACS resource, so DNS TXT records for domain verification will be different. Update your DNS records after re-configuring the custom domain.

Need Help?

Contact support@sentinelvaultsystems.com with your subscription ID and a description of your issue.