The Official Getting Started Guide
Ledger Live is the essential gateway for managing, checking, and interacting with your crypto assets secured by your Ledger hardware wallet. It is not an account provider; rather, it is a secure interface that reads the public ledger (blockchain) data and prepares transactions for your Ledger device to cryptographically sign. All private keys and the crucial 24-word recovery phrase remain isolated within the highly protected Secure Element chip of your device. This guide will take you step-by-step through the entire process, from initial prerequisites to executing your first secure transaction, ensuring you establish the highest level of security from the start. We strongly recommend reading each section carefully before proceeding. Ledger's security model relies on you being the final, vigilant auditor of every step.
**Security Priority:** You must only download the Ledger Live application from the official Ledger website. Avoid search results and direct links from forums or emails, as these are common vectors for malware. Once downloaded, run the installer. The application does not require administrator rights on most systems, which is an additional security feature. Follow the on-screen prompts to complete the installation. On the first launch, Ledger Live will prompt you to set up a password lock. **Choose a unique and strong password** for this application layer of security. This password protects the *interface* data (account names, transaction history, settings), but crucially, not your actual funds—only your Ledger device and 24-word phrase can do that.
Connect your Ledger device to your computer via the USB cable. Power it on and enter your PIN code directly on the device. In Ledger Live, select "Set up a new device." The application will walk you through a series of steps to initialize and check your device. The most important of these is the **Genuine Check**. Ledger Live communicates with the secure chip in your device to cryptographically verify that it is an authentic Ledger product and has not been tampered with. This process is automatic and non-invasive. Wait for Ledger Live to confirm "Your device is genuine." This verification is a critical step in establishing trust between the application and your hardware wallet.
If this is a brand new device, Ledger Live will guide you through setting up a **new PIN** and writing down your **24-word Recovery Phrase**. This phrase is the ultimate "mirror" of your private keys; it can regenerate them entirely. You must write it down on the provided sheet and store it in a secure, fireproof, waterproof location. Never rely on digital copies.
After authenticity is confirmed, navigate to the **Manager** section within Ledger Live. This section is your control center for your Ledger device. First, check the top banner for any pending **Firmware Updates**. Firmware updates contain critical security patches and new features. The process requires careful confirmation on your device's screen. Follow the instructions exactly, and do not disconnect the device during the update process. This is the single longest process in the initial setup.
Once the firmware is current, you can install the blockchain applications you need. For instance, to hold Bitcoin, you need the "Bitcoin" app installed on the device. To hold Ethereum or any ERC-20 tokens, you need the "Ethereum" app. Select the apps you require and click "Install." Ledger devices have limited storage, so you may need to uninstall an app later to make space, but rest assured, your crypto remains safe—uninstalling the app does not affect your funds, only the interface for managing them. You can reinstall the app at any time.
Navigate to the **Accounts** tab and click **'Add Account'**. Select the cryptocurrency you wish to add (e.g., Bitcoin). Ledger Live will instruct you to open the corresponding application on your physical Ledger device (e.g., open the Bitcoin app). Your Ledger device, when prompted by Ledger Live, will derive the public key from your recovery phrase. Ledger Live then uses this public key to scan the blockchain for existing balances and create a new account entry in the application. This derivation process is highly secure; the private keys never leave the hardware device. You can name your accounts descriptively (e.g., 'BTC Savings', 'ETH Trading').
For users with multiple Ledger devices or different purposes, Ledger Live allows you to manage multiple sets of accounts. The key security indicator is the small green dot next to your device name, confirming it is connected, unlocked, and authenticated.
To receive cryptocurrency, select the **Receive** tab. Choose the account you wish to fund. Ledger Live will generate a receiving address and display it on your screen. **Crucially**, Ledger Live will also display the same address on your physical Ledger device's screen. **You must manually compare the address displayed on your computer screen with the address displayed on your Ledger device.** This is the "Mirror Check" in action: verifying that the data presented by the untrusted computer environment perfectly mirrors the data confirmed by the trusted hardware environment. Only once you have verified the address on the device is it safe to copy and share the address with the sender. This check prevents sophisticated malware from intercepting and swapping the address on your computer screen.
This is the most critical operation. Select the **Send** tab. Choose the source account, enter the recipient's address, the amount, and the network fee level. When you click 'Continue', Ledger Live prepares the transaction data and sends it to your connected device. Your Ledger device will then prompt you to review and confirm the entire transaction package:
Only if the data on the Ledger screen perfectly matches your intent should you physically press the buttons on your device to approve and sign the transaction. Once signed, the transaction is broadcast to the network. This signing process, which happens *inside* the Secure Element, is the entire point of the hardware wallet: the private key never touches the potentially compromised computer.
Maintaining your Ledger Live application and device firmware is an ongoing commitment. Regularly check the Manager tab for updates and ensure your system passwords are changed frequently. The combination of secure hardware and vigilant software management is what provides the industry's highest standard of self-custody.
The core philosophy behind the Ledger Live and hardware device ecosystem is **Separation of Concern**. Your computer, which runs Ledger Live, is treated as an inherently insecure environment (hot environment). The Ledger device, however, is a certified, isolated Secure Element (cold environment). When Ledger Live wants to prepare a transaction, it compiles all the required data (recipient, amount, fee) and sends it over the USB connection. The critical, final step of signing the transaction using the private keys happens entirely within the cold environment of the device, shielded from any potential viruses or keyloggers on your desktop. This is why the **on-device verification (the "Mirror Check")** is non-negotiable—it's the only way you can be sure the data signed by your device is the same data you intended to sign, preventing man-in-the-middle attacks where a virus might swap the recipient address on your screen without your knowledge.
To maintain this security, always ensure you disconnect your device when you are finished managing your assets. You do not need to keep the Ledger device connected 24/7; Ledger Live can check your portfolio balance without the device being plugged in, as it only uses public keys for reading data. The device is only required for the irreversible actions of adding accounts, updating firmware, or signing transactions (sending funds). This separation allows for maximum convenience with uncompromising security. Furthermore, consider enabling the **Ledger Live application lock** feature, which automatically requires your password after a period of inactivity, adding a layer of privacy protection if you step away from your computer. The continued success of managing your digital assets is predicated not just on the technology, but on your disciplined adherence to these security protocols.
When using the Manager to install new applications, be aware that while the Ledger Nano S has limited space, the Ledger Nano X and other modern devices offer significantly more. If you run out of space, remember the rule: **uninstalling an app removes the interface, but the crypto stored on the blockchain remains secured by your 24-word phrase.** This distinction is key for troubleshooting space issues. Finally, the setup process is a one-time event; subsequent interactions with Ledger Live become seamless once the firmware is current and your accounts are added. The time investment made now in careful setup and security verification pays dividends in peace of mind for the lifetime of your crypto investments.
It is also prudent to regularly back up the Ledger Live settings file (which contains account names and transaction history, but *not* private keys) in case of a computer failure, although this is purely for convenience. The primary focus should always remain on the physical security of your 24-word recovery phrase and the vigilant confirmation of all transactions directly on the device's screen.