Incident Reporting Using PagerDuty Dashboard

Share This Post

Accelerynt customers utilizing Microsoft Sentinel can now manage incident reporting via the PagerDuty Dashboard.

PagerDuty’s status dashboard provides technical responders, business responders, and leaders a live, shared view of system health to improve awareness of operational issues.

With Accelerynt and PagerDuty working together, you can streamline incident reporting process and get the information you need to respond quickly and effectively.

Benefits of Using Sentinel Push Notifications and PagerDuty Together

When you integrate Accelerynt’s Sentinel Push Notifications with PagerDuty, you get several benefits including:

  1. Easy access to critical incident details for fast remediation
  2. Linkage to powerful dashboards that provide transparency into the incidents
  3. Streamlined collaborative triage and incident management functionality

With all your alerts in one place, you can quickly and easily identify incidents, share them with your team, and monitor your overall system.

This will help reduce response time, improve your overall efficiency, stay ahead of potential threats, and allow your team to work together to resolve incidents quickly and effectively.

How to Get Started

This playbook is intended to be run from a Microsoft Sentinel incident.

It will create a PagerDuty event with the related Microsoft Sentinel incident and entity information.


The following items are required under the template settings during deployment:

  • A PagerDuty integration key


To Create a PagerDuty Integration Key:

Log into your PagerDuty account at

Under the “Services” menu option, select “Service Directory”.

From the page, click the “New Service” button.

click the “New Service” button

Add a Name and optional Description like the following:

Add a Name and optional Description

Select an escalation policy for your service.

In this example, the default is used.

escalation policy for your service

There may be a step to select a noise reduction option for your service. The “Intelligent” option is recommended.

Finally, select the Microsoft Sentinel option under the Integrations section, then click “Create Service”.

then click “Create Service”

You will be redirected to the service you have created.

Under the Integrations tab view, you will find your integration key.

This will be needed for the deployment of this playbook.


To configure and deploy this playbook:

Open your browser and ensure you are logged into your Microsoft Sentinel workspace.

In a separate tab, open the link to our playbook on the Accelerynt Security GitHub Repository:

Deploy to Azure

Deploy to Azure Gov

Click the “Deploy to Azure” button at the bottom and it will bring you to the custom deployment template.

In the Project Details section:

  • Select the “Subscription” and “Resource Group” from the dropdown boxes you would like the playbook deployed to.

In the Instance Details section:

  • Playbook Name: This can be left as “AS-PagerDuty-Integration” or you may change it.
  • Integration Key: Enter the value of the PagerDuty integration key created from the first section.

Towards the bottom, click on “Review + create”.

click on “Review + create”

Once the resources have validated, click on “Create”.

click on “Create”

The resources should take around a minute to deploy.

Once the deployment is complete, you can expand the “Deployment details” section to view them.

Click the one corresponding to the Logic App.

Click the one corresponding to the Logic App

Click on the “Edit” button.

This will bring us into the Logic Apps Designer.

Click on the “Edit” button

The first step labeled “Connections” uses a connection created during the deployment of this playbook.

Before the playbook can be run, this connection will either need to be authorized in this step, or an existing authorized connection may be alternatively selected.

The first step labeled “Connections” uses a connection created during the deployment of this playbook

To validate the connection created for this playbook, expand the “Connections” step and click the exclamation point icon next to the name matching the playbook.

expand the “Connections” step and click the exclamation point icon

When prompted, sign in to validate the connection.

sign in to validate the connection

Once the connection step has been updated, click the “Save” button.

click the “Save” button

Running the Playbook

To run this playbook automatically on incidents in Microsoft Sentinel, navigate to “Automation” under “Configuration” in the left-hand menu.

Click the “Create” button and select “Automation Rule” option from the dropdown.

Click the “Create” button and select “Automation Rule” option

  1. Enter a name for the automation rule.
  2. Then stipulate the conditions for which you would like a Microsoft Sentinel Incident to be sent to PagerDuty. In the example below, criteria are set so that only incidents with high severity will be sent to PagerDuty.
  3. Select the “Run Playbook” option under the “Actions” section.
  4. Then select the name of the playbook that was just deployed from this page.
  5. Review the default values under the “Rule expiration” and “Order” section, then click Apply.

click Apply

Once this saves, your new integration should run automatically.


With Accelerynt’s Sentinel Notifications now integrated with PagerDuty, Sentinel customers can experience quick and streamlined incident reporting.

This will help reduce response times and improve the overall customer experience.

If you are not already a customer of Accelerynt, contact us today to learn more about how we can help with improving your business performance.

Email for more information.

More To Explore


DynamicsCon LIVE 2024

Accelerynt to showcase Dynamics 365 transformation and optimization solutions at DynamicsCon LIVE 2024. Event Information May 13-16, 2024 The Denver Marriott Tech Center Still Need