How to set up your Ledger hardware wallet | Ledger

Setting up a hardware wallet is one of the smartest moves you can make to secure digital assets. This guide walks you through unboxing, initializing your device, protecting the recovery phrase, installing the ledger live wallet, and adding accounts. Whether you’re brand-new to self-custody or refreshing your security routine, the steps below will help you start safely and confidently.

What you need before you begin

  • Your Ledger hardware wallet (e.g., Nano S Plus or Nano X)
  • USB cable (or Bluetooth where applicable)
  • A computer or phone with internet access
  • Paper and pen or a metal backup for your recovery phrase

Important: Only use the accessories included with your device. If anything looks tampered with, stop and contact support before proceeding.

Step 1: Power on and initialize the device

  1. Connect your Ledger to your computer or power it on.
  2. Select “Set up as new device.” If you’re restoring an existing wallet, choose the restore option instead.
  3. Create a strong PIN. This protects the device from unauthorized access—avoid simple patterns like 1111 or birth years.

Your PIN is required each time you unlock the wallet. Choose something memorable yet hard to guess, and never share it with anyone.

Step 2: Secure your 24-word recovery phrase

The device will display 24 words in order. Carefully write them down—twice if possible—and verify them when prompted. This phrase is the ultimate backup to your funds.

  • Store the phrase offline in a safe place; consider a fire- and water-resistant solution.
  • Never type your phrase on a computer or phone, and never take photos of it.
  • No support agent will ever ask for your phrase. If someone does, it’s a scam.

Pro tip: Treat the recovery phrase like the keys to your home and bank account combined. Anyone with it can move your assets.

Step 3: Install the ledger live wallet

On your computer or mobile device, download and install the ledger live wallet. This companion app lets you manage accounts, view balances, and approve transactions while your private keys remain safely on the hardware device. During first launch, choose “Set up a new device” or “Connect an existing device,” then follow on-screen checks to ensure the device is genuine.

Step 4: Add accounts for your coins

In the ledger live wallet, go to the “Accounts” or “Add account” section. Select the cryptocurrency you want to manage (e.g., Bitcoin or Ethereum). The app may prompt you to install the relevant coin app on your Ledger device—approve the installation on the device screen. Once added, you’ll see your account appear with a receive address you can use safely.

Step 5: Receive a small test transaction

Before moving significant funds, send a small test amount to your new receive address. Always verify the address on the Ledger device display and confirm it matches the one shown in the ledger live wallet. After the test confirms, you can transfer larger amounts with confidence.

Best practices for ongoing security

  • Keep firmware and the ledger live wallet updated to benefit from the latest security improvements.
  • Enable additional protections such as passphrases if you’re an advanced user.
  • Use a dedicated, malware-free computer profile for crypto activities.
  • Double-check every transaction on the device screen before approving.

Troubleshooting common setup issues

  • Device not recognized: Try a different USB cable/port, update drivers, or reconnect after closing other wallet apps.
  • Can’t install a coin app: Free space by uninstalling unused coin apps; this won’t remove funds.
  • Address mismatch: Cancel immediately and re-open the receive flow. Only trust the address confirmed on your device.

Wrapping up

You’ve initialized your device, protected the recovery phrase, installed the ledger live wallet, and added accounts—great work. With these fundamentals in place, you’re ready to manage crypto with hardware-level security and a smooth software experience. Keep your backups safe, stay vigilant against phishing, and verify every on-device prompt. That consistent routine is what keeps your assets under your control, today and long into the future.

Built with Dorik