1. Install a supported operating system
You can run Pi-hole in a container, or deploy it directly to a supported operating system via our automated installer.
![](https://pi-hole.net/wp-content/uploads/2020/08/supported-os-min.jpg)
2. Install Pi-hole
Our intelligent, automated installer asks you a few questions and then sets everything up for you. Once complete, move onto step 3.
![](https://pi-hole.net/wp-content/uploads/2016/12/Vortex-R.png)
3. Use Pi-hole as your DNS server
Configure your router’s DHCP options to force clients to use Pi-hole as their DNS server, or manually configure each device to use the Pi-hole as their DNS server.
![](https://pi-hole.net/wp-content/uploads/2022/11/dns-router.png)
4. Block ads everywhere, even on the go
By pairing your Pi-hole with a VPN, you can have ad blocking on your cellular devices, helping with limited bandwidth data plans.
![](https://pi-hole.net/wp-content/uploads/2020/08/vpn-300x300-1.jpg)
The Pi-hole Team
The Pi-hole Developers are spread across the globe and work on the project in their spare time. We are a 100% remote-work team.
![](https://pi-hole.net/wp-content/uploads/2018/12/dschaper.png)
Dan Schaper
Co-Founder
Core Developer
![](https://pi-hole.net/wp-content/uploads/2021/09/promofaux.jpg)
Adam Warner
Docker Maintainer
Core Developer
![](https://pi-hole.net/wp-content/uploads/2021/09/DL.jpg)
Dominik Derigs
FTL Designer
Core Developer
Web Interface
In addition to blocking advertisements, Pi-hole has an informative Web interface that shows stats on all the domains being queried on your network.
![](https://pi-hole.net/wp-content/uploads/2020/04/Dashboard.png)
Built-in DHCP Server
Pi-hole works fine with an existing DHCP server, but you can use Pi-hole’s to keep your network management in one place.
![](https://pi-hole.net/wp-content/uploads/2018/12/Screenshot-2018-12-19-17.39.58.png)
Manage White And Black Lists
Fine-tune your experience by blacklisting or whitelisting domains. Extend this capability with powerful regex statements.
![](https://pi-hole.net/wp-content/uploads/2020/02/Screenshot-2018-12-22-11.17.24.png)
Query Log
See all the domains being queried on your network, where they originated, and more.
![](https://pi-hole.net/wp-content/uploads/2018/12/Screenshot-2018-12-19-17.50.40.png)
Long Term Statistics
Queries are stored in a database and can be queried at any time. Learn about what’s happening on your network over time.
![](https://pi-hole.net/wp-content/uploads/2020/08/long-term-stats1-e1597224606922.png)
Audit Log
Keep track of the most queried domains and add them to a white or blacklist from a central page.
![](https://pi-hole.net/wp-content/uploads/2020/08/audit-log1.png)
Privacy Modes
Choose from four different privacy modes that works for your environment.
![](https://pi-hole.net/wp-content/uploads/2020/02/Screenshot-2018-12-20-12.30.34.png)
Other Settings
Control and configure other settings from the Web interface.
![](https://pi-hole.net/wp-content/uploads/2020/02/Screenshot-2018-12-20-12.26.29.png)