Escalation Policies
An escalation policy defines what happens when an incident is triggered and nobody responds — who gets paged, in what order, and after how long.
How Escalation Works
When an incident is created, On-Call starts the escalation clock:
- Step 1 fires immediately (if delay = 0) — notifications sent to all targets in Step 1
- If no acknowledgment within Step 1's delay window → Step 2 fires
- If no acknowledgment within Step 2's delay window → Step 3 fires
- If all steps complete without acknowledgment → policy repeats (if repeat count > 0)
- After all repeats exhaust → incident remains triggered, no further escalation
The escalation engine checks all triggered incidents every 60 seconds.
Escalation Policy Structure
Each policy has:
- A name and optional description
- One or more steps in ordered sequence
- A repeat count — how many times to run through all steps if nobody acknowledges
Escalation Steps
| Field | Description |
|---|---|
| Order | Step sequence number (automatically managed) |
| Delay (minutes) | Time to wait after the previous step before firing this step. Step 1 delay = time after incident creation. |
| Targets | Who to notify: one or more users, schedules, or teams |
| Notify Methods | Channels for this step: email, SMS, phone, push, Slack |
Step Target Types
User — A specific named technician. Use for leads, managers, or specialists who should always be in the chain.
Schedule — The currently on-call user for a named schedule. Use this for Step 1 — it dynamically resolves to whoever is on duty at the time the incident fires.
Team — A team group. (Resolves to team members — use for broadcast notifications to a whole group.)
Creating an Escalation Policy
- Click Escalation Policies in the left sidebar.
- Click New Policy.
- Enter a name (e.g.,
Standard MSP Escalation). - Add Step 1:
- Target: your primary on-call schedule
- Delay:
0 minutes - Methods:
Email
- Add Step 2:
- Target: your senior technician (user)
- Delay:
15 minutes - Methods:
Email
- Add Step 3:
- Target: manager (user)
- Delay:
30 minutes - Methods:
Email
- Set Repeat Count:
2(escalates through all steps twice before stopping) - Click Save.
Sample Escalation Patterns
Small MSP (2–5 technicians)
| Step | Target | Delay | Methods |
|---|---|---|---|
| 1 | On-call schedule | 0 min | |
| 2 | Backup technician (user) | 10 min | |
| 3 | Owner (user) | 20 min |
Repeat: 1
Tiered MSP (10+ technicians)
| Step | Target | Delay | Methods |
|---|---|---|---|
| 1 | Tier 1 on-call schedule | 0 min | |
| 2 | Tier 2 on-call schedule | 10 min | |
| 3 | Service Desk Lead (user) | 20 min | |
| 4 | VP of Service Delivery (user) | 30 min |
Repeat: 2
Critical Security Escalation (Defend integration)
| Step | Target | Delay | Methods |
|---|---|---|---|
| 1 | Security on-call schedule | 0 min | |
| 2 | Security lead (user) | 5 min | |
| 3 | CISO / Owner (user) | 10 min |
Repeat: 3
Editing an Escalation Policy
- Click the policy name in the Escalation Policies list.
- Click Edit.
- Add, remove, or reorder steps.
- Click Save.
Changes take effect for all new incidents. Active incidents continue with the policy version that was in effect when the incident was created.
Assigning a Policy to a Service
Escalation policies are assigned at the service level, not the schedule level. A single policy can serve multiple services.
- Go to Services.
- Open or create a service.
- Set the Escalation Policy field.
- Click Save.
All incidents triggered against that service will use the assigned policy.
Repeat Behavior
The repeat count controls how many times the full escalation chain reruns after exhausting all steps with no acknowledgment:
| Repeat Count | Behavior |
|---|---|
| 0 | Policy runs once; no repeat after last step |
| 1 | Policy runs a second time (total 2 cycles) |
| 2 | Policy runs a third time (total 3 cycles) |
After all repeat cycles complete, the incident remains in triggered state but no further notifications are sent. The on-call team must manually acknowledge or resolve it.
Escalation Timeline
Every incident records a timeline of escalation events. To view:
- Open an incident from the Incidents list.
- Scroll to the Timeline section.
Each entry shows: timestamp, step number, targets notified, and notification methods used. This is useful for post-incident review and SLA auditing.