Slide 1 • 40s

Welcome

What this session covers

Quick orientation

Audience: new device owners

Welcome to the Trezor setup guide. This short presentation walks you through the essential steps to get your hardware wallet ready. We'll cover unpacking, connecting, initial firmware checks, seed creation, PIN setup, and safe storage. Follow the links to the official start page for firmware and software downloads. Throughout, prioritize safety: never share your recovery seed and only use official resources.

Slide 2 • 60s

Unboxing

Check the package

Items to expect

Verify tamper seals

When you first open the box, inspect the seal and packaging. Inside you should find the Trezor device, a USB cable, recovery seed cards, stickers, and quick-start documentation. Do not use the device if packaging looks tampered with. Only proceed if everything matches the official packing list. If anything seems off, contact official support rather than attempting setup.

Slide 3 • 70s

Connecting the device

Physical connection

Use the supplied cable

Supported OS

Connect your Trezor to a trusted computer using the supplied cable. Prefer a direct USB port (avoid hubs when possible). Open a modern browser and go to the official start link. The device will power on and display a welcome screen. Do not plug into unknown or public machines. Ensure the browser and OS are updated to the latest versions before continuing.

Slide 4 • 80s

Firmware & verification

Only official firmware

Verify signatures

Do not skip this

The first step often requires installing official firmware. Always use the firmware provided via the official start page. Verify the firmware using in-browser prompts and the device screen. A secure firmware ensures your private keys remain protected. Never accept firmware offered from third-party sites or unknown installers. If the firmware verification fails, stop and contact support.

Slide 5 • 100s

Creating your recovery seed

Seed importance

Write on seed card

Never store digitally

Your recovery seed is the single most important piece of information. Generate it on-device and write the words by hand onto the supplied recovery card. Create multiple, geographically separated copies if needed. Never photograph, screenshot, or type your seed on a networked device. If anyone obtains your seed, they can access your funds. Keep copies in secure, fireproof storage and consider a steel backup product for long-term durability.

Slide 6 • 60s

Set up a PIN

Extra layer of protection

Use a long, memorable code

PIN on-device only

A PIN prevents physical attackers from using your device if it’s stolen. Choose a PIN you can remember but is non-obvious. The PIN is entered on the connected computer but confirmed on-device for security. If you forget your PIN, the recovery seed is required to restore access, so ensure your seed is safe before setting a strict PIN.

Slide 7 • 80s

Adding accounts & receiving

Use official wallet UI

Check addresses on-device

Receive test transaction

After setup you can create accounts and receive assets. Always verify receiving addresses on your Trezor device display before sending funds. Send a small test transaction when you first receive funds to confirm everything works. Familiarize yourself with the wallet UI provided through Trezor Suite or the recommended web interface.

Slide 8 • 90s

Security best practices

Maintain physical and digital hygiene

Regular checks and updates

Be skeptical of phishing

Keep firmware and software updated, use strong unique passwords for any accounts, and be vigilant against phishing emails and fake websites. Bookmark official resources and double-check URLs. If you ever receive suspicious messages or prompts to reveal your seed, treat them as malicious. Consider using passphrases for added seed security if you understand the implications and recovery complexity.

Slide 9 • 80s

Practice a recovery

Test recovery procedure

Use a temporary device or emulator

Confirm your backup works

To validate your backups, practice restoring to a spare device or through an emulator (in a safe environment). Do not restore your seed on untrusted devices. Testing ensures you understand the restoration steps and that your written copies are accurate. Keep a log of where each copy is stored, and who (if anyone) holds a copy for emergency access, while maintaining security and privacy.

Slide 10 • 50s

Summary & resources

Final checklist

Keep the seed offline

Official links

Checklist: verify package, install official firmware, write and secure your seed, set a PIN, verify addresses on-device, and keep software updated. For downloads and detailed help visit the official start page. If you need to convert this to a PowerPoint: Print to PDF, then import the PDF to PowerPoint, or copy content slide-by-slide into Office and apply your company theme.