Universal Intel Chipset Device Updater is an advanced, security-focused tool that automatically detects your Intel hardware and installs the latest official chipset INF files with enterprise-grade safety measures.
This project was built through a pragmatic collaboration between human expertise and AI-assisted tooling.
Intel's official Chipset Device Software has evolved over 25 years into a complex, bloated package. This tool simplifies the process by automatically detecting and installing only the INF files your system actually needs β nothing more, nothing less.
For a detailed technical breakdown and historical context, see:
β The Whole Truth About Intel Chipset Device Software
β Behind the Project: Making Of
β If this project helped you, please click the "Star" button at the top of this page on GitHub.
- Official threads on the following technology forums: TechPowerUp, Win-Raid, Station-Drivers and WinClub.
- For transparency and additional verification, the project has recently been listed on: MajorGeeks and Softpedia.
Tip
I'm currently seeking new challenges where I can apply my expertise in solving complex IT infrastructure problems. If your organization struggles with system compatibility, automation, or tooling gaps β let's discuss how I can help.
π Connect with me: linkedin.com/in/marcin-grygiel
- Table of Contents
- Release Highlights
2.1 Latest Version
2.2 Previous Releases - Independent Security Audits
- Application Overview
- Key Features
5.1 Smart Hardware Detection
5.2 Multi-Layer Security
5.3 Seamless Operation
5.4 Comprehensive Coverage - System Requirements
6.1 System Requirements Table
6.2 Windows Version Support
6.3 Legacy System Notes - Quick Comparison
- Quick Start
8.1 Method 1: One-Click Execution
8.2 Method 2: PowerShell Direct
8.3 Method 3: Hardware ID Scanner Only - How It Works
9.1 Self-Verification & Update Check
9.2 Hardware Detection
9.3 Database Query & Matching
9.4 Security Verification
9.5 Installation & Cleanup - Security First Approach
10.1 Verified Security Layers - Usage Scenarios
11.1 Home Users
11.2 IT Professionals & Technicians
11.3 System Builders - Download Options
12.1 Option 1: SFX Executable (Recommended)
12.2 Option 2: Script Bundle
12.3 Option 3: Source Code - Independent Audit Results
- Project Structure
- Release Structure
15.1 Primary Files
15.2 Verification Files
15.3 Documentation - Frequently Asked Questions (FAQ)
16.1 Is this tool safe to use?
16.2 Will this update all my Intel drivers?
16.3 What are the risks?
16.4 Where are files downloaded?
16.5 What if something goes wrong?
16.6 How does the automatic update check work?
16.7 What does self-hash verification do?
16.8 How are updates notified?
16.9 Why is the certificate "not trusted"? - Intel Platform Support
- Performance Metrics
18.1 Typical Execution Time Breakdown (Updated)
18.2 Disk Space Usage
18.3 Memory (RAM) Usage
18.4 Resource Usage Summary - Known Issues
- Ready to Update?
20.1 Quick Start Guide
20.2 Verification Steps (Optional)
20.3 Need Help? - Contributing
- License
- Acknowledgments
- Important Links
- Author & Contact
- Support This Project
Universal Intel Chipset Device Updater v2026.02.0009 β Release Notes
- Database Scanner Fix: 300 Series β Cannon Lake PCH:
- Fixed missing 300 Series chipsets (Cannon Lake-H/LP) in generated INF database
- All 141 HWIDs (73+68) now appear correctly in
intel-chipset-infs-latest.md - Updated PCH Family legend now includes
- 300 Series - Cannon Lake PCH (Mobile)
- Cosmetic Message Formatting:
- Improved console output alignment and readability
- Refined status messages in platform display
- Intel Platform Scanner: Added missing platforms to
$pchFamilyListand corrected key casing in$archNameOverride - Markdown Generation: Embedded legend now includes 300 Series entry
- Message Functions: Enhanced
Write-LogandShow-Screen2formatting
- Resolved complete absence of 300 Series (Cannon Lake PCH) from Markdown output
- Fixed case-sensitivity issue preventing correct platform categorization
- Added missing line in PCH Family legend
universal-intel-chipset-updater.ps1β Main updater script (unchanged functionality)universal-intel-chipset-updater.batβ Simplified launcherChipsetUpdater-2026.02.0009-Win10-Win11.exeβ Self-extracting package (includes updated scanner)Intel-Package-Extractor.ps1β INF extraction script v1.0 (not included)Intel-Platform-Scanner.ps1β INF scanner script v6.8 (not included)
- Minimum Requirements: Windows 10 LTSC 2019 (build 17763) or newer, .NET Framework 4.7.2+
- Database rebuild: Run the scanner after updating to regenerate
intel-chipset-infs-latest.md - Core updater logic (Windows Inbox detection, version comparison) unchanged from v2026.02.0008
Summary: v2026.02.0009 fixes a critical database issue where 300 Series (Cannon Lake PCH) was missing from the generated INF list. All HWIDs are now correctly displayed, and console output formatting has been polished. The updater retains all previous enhancements, including Windows Inbox INF detection.
- v2026.02.0008 β Release Notes
- v2026.02.0007 (old v10.1-2026.02.2) β Release Notes
- v2026.02.0006 (old v10.1-2026.02.1) β Release Notes
- v2025.11.0005 (old v10.1-2025.11.8) β Release Notes
- v2025.11.0004 (old v10.1-2025.11.7) β Release Notes
- v2025.11.0003 (old v10.1-2025.11.6) β Release Notes
- v2025.11.0002 (old v10.1-2025.11.5) β Release Notes
- v2025.11.0001 (old v10.1-2025.11.0) β Release Notes
This project has undergone comprehensive analysis by multiple AI security experts to ensure code quality and reliability. The tool achieved an average security score of 9.4/10 across all independent assessments.
| Auditor | Score | Key Assessment |
|---|---|---|
| Grok | 9.8/10 | "This is currently the highest score I have ever given to a community driver-related utility." |
| ChatGPT | 9.6/10 | "It does not behave like a hobby script, but like a carefully scoped system utility." |
| Gemini | 9.5/10 | "This tool is superior to many generic driver update solutions. It is safe, transparent, and highly efficient." |
| Copilot | 9.4/10 | "It is one of the most complete and technically impressive PowerShell-based hardware automation tools publicly available." |
| DeepSeek | 9.2/10 | "The Universal Intel Chipset Device Updater represents a remarkable achievement in independent software development." |
| Claude | 8.7/10 | "Automating Intel chipset INF updates for enthusiast and IT users β this is the best open-source option available." |
For detailed audit reports and methodology, see SECURITY-AUDITS.md.
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
![]() |
![]() |
![]() |
![]() |
| Security check and update check | Hardware detection and version analysis | Creating a system restore point | Download, verify and install |
- Automatically scans for Intel chipset components
- Identifies specific Hardware IDs (HWIDs)
- Supports chipsets from Sandy Bridge to latest generations
- Detects both Consumer and Server platforms
- SHA-256 Hash Verification for all downloads
- Digital Signature Validation (Intel Corporation certificates)
- Automated System Restore Points before installation
- Dual-Source Download with backup fallback
- Administrator Privilege Enforcement
- No installation required - fully portable
- Automatic version checking and updates
- Clean, intuitive user interface
- Detailed logging and debug mode
- Save to Downloads folder option
- Mainstream Desktop/Mobile platforms
- Workstation/Enthusiast systems
- Xeon/Server platforms
- Atom/Low-Power devices
| Component | Minimum | Recommended | Notes |
|---|---|---|---|
| Windows Version | 10 1809 (17763) | 11 22H2+ | 1809 requires .NET 4.7.2+ |
| .NET Framework | 4.6.1 | 4.8+ | 4.7.2+ for TLS 1.2 on older Windows |
| PowerShell | 5.1 | 7.3+ | Windows PowerShell 5.1 included |
| Administrator | Required | Required | For driver installation |
| Internet | Required | Required | For hash verification and updates |
| RAM | 2 GB | 4 GB+ | For INF extraction/installation |
| Disk Space | 500 MB | 1 GB+ | Temporary files during installation |
| System Restore | Optional | Enabled | Automatic restore point creation |
| Version | Build | Status | Notes |
|---|---|---|---|
| Windows 11 | All builds | β Full | Optimized support |
| Windows 10 | 22H2+ | β Full | Recommended |
| Windows 10 | 21H2 | β Full | Stable |
| Windows 10 | 21H1 (19043) | β Full | Legacy |
| Windows 10 | 20H2 (19042) | β Full | Legacy |
| Windows 10 | 2004 (19041) | β Full | Legacy |
| Windows 10 | 1909 (18363) | β Full | Legacy |
| Windows 10 | 1903 (18362) | β Full | Legacy |
| Windows 10 | 1809 (17763) | β Limited | Requires .NET 4.7.2+ for TLS 1.2 support |
| Windows 10 | LTSB 2016 (1607) | Manual updates required for TLS 1.2 | |
| Windows 10 | LTSB 2015 (1507) | Manual updates required for TLS 1.2 |
- Windows 10 1809 (17763) and newer: Full TLS 1.2 support out-of-the-box
- Windows 10 LTSB 2015/2016: May require manual installation of:
- .NET Framework 4.8
- KB4474419 (SHA-2 update)
- The tool automatically:
- Detects Windows version limitations
- Warns about potential connectivity issues
- Provides fallback options for offline operation
- Basic INF detection and installation works even without internet connectivity
| Feature | This Tool | Intel DSA | Manual Installation |
|---|---|---|---|
| Automatic Detection | β Full | β Partial | β Manual |
| Security Verification | β Multi-layer | β Basic | β None |
| System Restore Points | β Automatic | β None | β Manual |
| Update Notifications | β Built-in | β Yes | β None |
| Self-updating | β Yes | β No | β No |
| Portable | β No install | β Requires install | β /β Varies |
| Free | β 100% | β Yes | β Yes |
# Download and run executable file as Administrator:
ChipsetUpdater-10.1-202x.xx.x-Win10-Win11.exe (or later version)
# Optionaly, download .ps1 and .bat files, then run BATCH file as Administrator:
Universal-Intel-Chipset-Updater.bat
# Run PowerShell as Administrator, then:
.\Universal-Intel-Chipset-Updater.ps1# For diagnostic purposes
Get-Intel-HWIDs.bat- Integrity Verification - Validates script hash against GitHub release
- Update Detection - Compares current version with latest available
- Security First - Ensures tool hasn't been modified or corrupted
- Scans PCI devices for Intel Vendor ID (8086)
- Identifies chipset-related components
- Extracts Hardware IDs and current driver versions
- Downloads latest INF database from GitHub
- Matches detected HWIDs with compatible packages
- Compares current vs latest versions
- Creates system restore point automatically
- Downloads from primary/backup sources
- Verifies SHA-256 hashes
- Validates Intel digital signatures
- Executes official Intel setup with safe parameters
- Provides real-time progress feedback
- Automatic cleanup of temporary files
1. Self-Integrity β Script Hash Verification
2. File Integrity β SHA-256 Hash Verification
3. Authenticity β Intel Digital Signatures
4. Project Origin β FirstEver.tech Digital Signature
5. System Safety β Automated Restore Points
6. Source Reliability β Dual Download Sources
7. Privilege Control β Admin Rights Enforcement
8. Update Safety β Version Verification
- Keep system updated without technical knowledge
- Automatic safety checks prevent installation issues
- One-click operation with clear prompts
- Batch deployment across multiple systems
- Comprehensive logging for troubleshooting
- Security verification for corporate environments
- Pre-installation preparation for new builds
- Driver consistency across multiple systems
- Time-saving automation vs manual updates
- File:
ChipsetUpdater-10.1-202x.xx.x-Win10-Win11.exe - Features: Digital signature, one-click execution, automatic extraction
- For: Most users, easiest method
- Files:
universal-intel-chipset-updater.bat+universal-intel-chipset-updater.ps1 - Features: Full control, modifiable code, transparency
- For: Advanced users, customization
- Method:
git clonethe repository - Features: Latest development version, full customization
- For: Developers, contributors
This project has been thoroughly audited by 6 independent AI security experts, achieving an average score of 9.4/10. Multiple auditors confirmed it's the safest and most stable version ever released, suitable for daily use, corporate deployment, and technician toolkits.
View Full Audit Report β’ Security Policy
For current limitations and workarounds, please see: KNOWN_ISSUES.md
Key Files and Directories:
src/ - Main scripts directory
- universal-intel-chipset-updater.bat - Main batch script
- universal-intel-chipset-updater.ps1 - Main PowerShell script
- get-intel-hwids.bat - Hardware ID scanner batch script
- get-intel-hwids.ps1 - Hardware ID scanner PowerShell script
data/ - Data files
- intel-chipset-infs-latest.md - Latest INF database
- intel-chipset-infs-download.txt - Download links
docs/ - Documentation
-
BEHIND-THE-PROJECT_EN.md - Project background (English)
-
BEHIND-THE-PROJECT_PL.md - Project background (Polish)
-
audit-reports/- Security audit reports- 2026-02-01-CHATGPT-AUDIT.md
- 2026-02-01-CLAUDE-AUDIT.md
- 2026-02-01-COPILOT-AUDIT.md
- 2026-02-01-DEEPSEEK-AUDIT.md
- 2026-02-01-GEMINI-AUDIT.md
- 2026-02-01-GROK-AUDIT.md
- 2025-11-21-CHATGPT-AUDIT.md
- 2025-11-21-CLAUDE-AUDIT.md
- 2025-11-21-COPILOT-AUDIT.md
- 2025-11-21-DEEPSEEK-AUDIT.md
- 2025-11-21-GEMINI-AUDIT.md
- 2025-11-21-GROK-AUDIT.md
assets/ - Screenshots
ISSUE_TEMPLATE/ - Issue templates
- bug_report.md - Bug report template
- config.yml - Issue templates configuration file
/ - Root directory files
- CHANGELOG.md - Project changelog
- CONTRIBUTING.md - Contribution guidelines
- KNOWN_ISSUES.md - Known issues and workarounds
- LICENSE - MIT License
- PULL_REQUEST_TEMPLATE.md - Pull request template
- README.md - Main project documentation
- SECURITY.md - Security policy
- SECURITY-AUDITS.md - Comprehensive security audits summary
Each version (v10.1-202x.xx.x) includes:
ChipsetUpdater-10.1-202x.xx.x-Win10-Win11.exe- Main executable (digitally signed)universal-intel-chipset-updater.bat- Batch wrapperuniversal-intel-chipset-updater.ps1- PowerShell script
ChipsetUpdater-10.1-2025.11.6-Win10-Win11.sha256- EXE hashuniversal-intel-chipset-updater-10.1-202x.xx.x-ps1.sha256- PS1 script hashFirstEver.tech.cer- Digital certificate
CHANGELOG.md- Version historySECURITY-AUDITS.md- Security reports
Yes! This tool has undergone comprehensive independent security audits by 6 different AI experts with an average score of 9.1/10. Multiple auditors confirmed it's the safest and most stable version ever released, suitable for daily use, corporate deployment, and technician toolkits.
Security measures include:
- Hash verification of all downloads
- Automatic system restore points before installation
- Official Intel drivers only from trusted sources
- Comprehensive pre-installation checks
Version 10.1-2025.11.6 is strongly recommended by security auditors for optimal safety and performance.
This tool specifically updates chipset INF files. It does not update GPU, network, or other device drivers.
As with any system modification, there's a small risk of temporary system instability. The automated restore point minimizes this risk significantly.
Files are temporarily stored in C:\Windows\Temp\IntelChipset\ and automatically cleaned up after installation.
The tool creates a system restore point before making changes. You can also check detailed logs in the temp directory.
The tool compares your current version with the latest version on GitHub. If a newer version is available, it offers to download it directly to your Downloads folder with full verification.
Before execution, the tool calculates its own SHA-256 hash and compares it with the official hash from GitHub. This ensures the file hasn't been modified, corrupted, or tampered with.
The tool automatically checks for updates on each run and clearly notifies you if a newer version is available, with options to continue or update.
The FirstEver.tech certificate is self-signed for project authenticity. Public trust requires expensive commercial certificates, but the included certificate allows verification of file origin.
| Generation | Code Name | Status | Notes |
|---|---|---|---|
| 12th-14th Gen | Alder/Raptor Lake | β Full | Latest support |
| 10th-11th Gen | Comet/Tiger Lake | β Full | Complete support |
| 8th-9th Gen | Coffee/Whiskey Lake | β Full | Stable support |
| 6th-7th Gen | Skylake/Kaby Lake | β Full | Mature support |
| 4th-5th Gen | Haswell/Broadwell | β Full | Legacy support |
| 2nd-3rd Gen | Sandy/Ivy Bridge | β Full | Extended support |
| Stage | Estimated Usage | Notes |
|---|---|---|
| SFX archive (download) | ~0.7 MB | Self-extracting EXE |
| Extracted scripts (BAT + PS1) | ~90 KB | Temporary working files |
| System Restore Point | 100β300 MB | Managed by Windows (shadow copy storage) |
| Downloaded Intel package | 2β10 MB | EXE or MSI, platform-dependent |
| Extracted package contents | 10β30 MB | Temporary extraction of INF files |
| Peak temporary disk usage | ~150β350 MB | During restore point creation and extraction |
| Persistent disk usage after completion | < 5 MB | Scripts and logs only |
Important notes:
- System Restore Point size is the dominant factor and depends on Windows configuration.
- All extracted installer files are automatically removed after completion.
- No drivers or binaries remain installed β only INF metadata.
| Component | Estimated Usage | Notes |
|---|---|---|
| BAT launcher | < 5 MB | cmd.exe overhead |
| PowerShell runtime | 40β80 MB | Script execution, parsing and hashing |
| INF parsing & HWID scan | 20β40 MB | Temporary in-memory data structures |
| Installer extraction (EXE/MSI) | 30β100 MB | Short peak during unpacking |
| Peak RAM usage | ~100β200 MB | Worst-case during package extraction |
Memory characteristics:
- RAM usage is short-lived and released immediately after each phase.
- No background services or resident processes.
- Safe even for systems with 2 GB RAM.
- Required free disk space: ~350 MB (safe upper bound)
- Typical disk usage: ~150β250 MB
- Peak RAM usage: ~100β200 MB
- Persistent footprint after exit: negligible
For current limitations and workarounds, please see: KNOWN_ISSUES.md
- Download latest release from Releases page
- Verify digital signature and hashes (optional but recommended)
- Run as Administrator for full system access
- Follow prompts - tool handles everything automatically
- Restart if prompted to complete installation
- Check file hashes match published SHA256 files
- Verify digital signature with included certificate
- Review security audit reports for confidence
- π Full Documentation
- π Report Issues
- π¬ Community Discussions
- π§ Troubleshooting Guide
- π Security Informationβ Back to top
We welcome contributions! Please feel free to submit pull requests, report bugs, or suggest new features.
Areas for Contribution:
- Additional hardware platform support
- Translation improvements
- Documentation enhancements
- Testing on various Windows versions
This project is licensed under the MIT License - see the LICENSE file for details.
- Intel Corporation for providing official driver packages
- Security researchers for independent audits
- Open source community for continuous improvement
- Beta testers for real-world validation
- Releases - Download latest version
- Security Audits - Full audit history
- Issue Tracker - Report problems
Marcin Grygiel aka FirstEver
- π Website: www.firstever.tech
- πΌ LinkedIn: Marcin Grygiel
- π§ GitHub: FirstEverTech
- π§ Contact: Contact Form
This project is maintained in my free time. Your support helps cover development costs and server expenses.
Your support means everything! If this project helped you, please consider:
- If this project helped you, please give it a β star on GitHub
- Sharing with friends and colleagues
- Reporting issues or suggesting features
- Supporting development financially
Note: This tool is provided as-is for educational and convenience purposes. While we strive for accuracy, always verify critical INF updates through official channels. The complete HWID database is available for transparency and community contributions.




