Universal Intel Chipset Device Updater is an advanced, security-focused tool that automatically detects your Intel hardware and installs the latest official chipset INF files with enterprise-grade safety measures.
This project was built through a pragmatic collaboration between human expertise and AI-assisted tooling.
Intel's official Chipset Device Software has evolved over 25 years into a complex, bloated package. This tool simplifies the process by automatically detecting and installing only the INF files your system actually needs β nothing more, nothing less.
For detailed documentation and guides, see:
β The Whole Truth About Intel Chipset Device Software
β Behind the Project: Making Of
β Deploying Universal Intel Chipset Device Updater via MDM
β How to verify the latest INF files yourself
β If this project helped you, please click the "Star" button at the top of this page on GitHub.
- Official threads on the following forums: TechPowerUp, Win-Raid, Station-Drivers, ElevenForum and WinClub.
- For transparency and additional verification, the project has recently been listed on: MajorGeeks and Softpedia.
Tip
I'm currently seeking new challenges where I can apply my expertise in solving complex IT infrastructure problems. If your organization struggles with system compatibility, automation, or tooling gaps β let's discuss how I can help.
π Connect with me: linkedin.com/in/marcin-grygiel
- Table of Contents
- Release Highlights
2.1 Latest Version
2.2 Previous Release
2.3 Older Releases - Independent Security Audits
- Application Overview
- Key Features
5.1 Smart Hardware Detection
5.2 Multi-Layer Security
5.3 Seamless Operation
5.4 Comprehensive Coverage - System Requirements
6.1 System Requirements Table
6.2 Windows Version Support
6.3 Legacy System Notes - Quick Comparison
- Quick Start
8.1 Method 1: One-Click Execution
8.2 Method 2: PowerShell Direct
8.3 Method 3: Hardware ID Scanner Only
8.4 Method 4: PowerShell Gallery
8.5 Command-Line Options - How It Works
9.1 Self-Verification & Update Check
9.2 Hardware Detection
9.3 Database Query & Matching
9.4 Security Verification
9.5 Installation & Cleanup - Security First Approach
10.1 Verified Security Layers - Usage Scenarios
11.1 Home Users
11.2 IT Professionals & Technicians
11.3 System Builders - Download Options
12.1 Option 1: SFX Executable (Recommended)
12.2 Option 2: Script Bundle
12.3 Option 3: Source Code - Project Structure
- Release Structure
14.1 Primary Files
14.2 Verification Files
14.3 Documentation - Frequently Asked Questions (FAQ)
15.1 Is this tool safe to use?
15.2 Will this update all my Intel drivers?
15.3 What are the risks?
15.4 Where are files downloaded?
15.5 What if something goes wrong?
15.6 How does the automatic update check work?
15.7 What does self-hash verification do?
15.8 How are updates notified?
15.9 Why is the certificate "not trusted"? - Intel Platform Support
- Performance Metrics
17.1 Typical Execution Time Breakdown
17.2 Disk Space Usage
17.3 Memory (RAM) Usage
17.4 Resource Usage Summary - Known Issues
- Ready to Update?
19.1 Quick Start Guide
19.2 Verification Steps (Optional)
19.3 Need Help? - Contributing
- License
- Acknowledgments
- Important Links
- Author & Contact
- Support This Project
Universal Intel Chipset Device Updater v2026.03.0012 β Release Notes
- Published to PowerShell Gallery β NEW:
- Install via
Install-Script universal-intel-chipset-device-updater - Script renamed to
universal-intel-chipset-device-updater.ps1to match PSGallery package name
- Install via
- Help system unified β
-helpand-?now show identical output via nativeGet-Help
- Path Handling: Replaced hardcoded
C:\Windows\TempandC:\ProgramDatawith$env:SystemRootand$env:ProgramDatafor compatibility with non-standard Windows installations - Boolean Flags: Refactored
$DebugModeand$SkipSelfHashVerificationfrom integer0/1flags to native PowerShell[bool]types - Code Cleanup: Removed redundant
Get-FileHash256wrapper β logic inlined directly intoVerify-FileHash - Consistency: Replaced all
clsalias occurrences withClear-Host
universal-intel-chipset-device-updater.ps1β Main updater scriptChipsetUpdater-2026.03.0012-Win10-Win11.exeβ Self-extracting package (includes updated script)Intel-Platform-Scanner.ps1β Scanner script (unchanged)Generate-HardwareAccurateMD.ps1β Database generator (unchanged)
v2026.03.0011 β Release Notes
- Dynamic Support Message:
- The credits screen now loads its support message dynamically from GitHub (
data/intel-chipset-infs-message.txt) - Message can be updated independently β no new script release required
- Supports inline color formatting via simple tags (e.g.
[Magenta],[White,DarkBlue]) - Falls back to a built-in static version if GitHub is unreachable
- The credits screen now loads its support message dynamically from GitHub (
- Batch Launcher Retired:
universal-intel-chipset-updater.bathas been removed from the release- The tool is now distributed exclusively as a direct PS1 (for administrators) or SFX EXE (for end users)
- v2026.03.0010 β Release Notes
- v2026.02.0009 β Release Notes
- v2026.02.0008 β Release Notes
- v2026.02.0007 (old v10.1-2026.02.2) β Release Notes
- v2026.02.0006 (old v10.1-2026.02.1) β Release Notes
- v2025.11.0005 (old v10.1-2025.11.8) β Release Notes
- v2025.11.0004 (old v10.1-2025.11.7) β Release Notes
- v2025.11.0003 (old v10.1-2025.11.6) β Release Notes
- v2025.11.0002 (old v10.1-2025.11.5) β Release Notes
- v2025.11.0001 (old v10.1-2025.11.0) β Release Notes
This project has undergone comprehensive analysis by multiple independent AI security experts across three audit cycles. The tool achieved an average security score of 9.6/10 across all completed assessments in March 2026.
| Auditor | Latest Score | Key Assessment |
|---|---|---|
| ChatGPT | 9.7/10 | "The project now qualifies as a production-grade open-source system utility, rather than a typical hobby project." |
| Claude | 9.1/10 | "For its intended use case β automating Intel chipset INF updates across single systems and managed fleets alike β this is the reference implementation." |
| Copilot | 9.5/10 | "One of the most complete and technically impressive PowerShell-based hardware automation tools available publicly." |
| DeepSeek | 9.4/10 | "A shining example of what focused, user-centered development can achieve." |
| Gemini | 10/10 | "No longer just a utility β a benchmark for how system automation scripts should be built, maintained, and secured." |
| Grok | 9.9/10 | "Currently the safest, most reliable and best-maintained open-source Intel chipset INF updater available in 2026." |
For full score history across all audit cycles, methodology, and detailed reports, see SECURITY-AUDITS.md.
Note: Latest audits conducted March 2026 (v2026.03.0011/0012). Core security architecture unchanged since audit. ChatGPT March 2026 update planned (paid tier required for full codebase analysis).
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
![]() |
![]() |
![]() |
![]() |
| Security check and update check | Hardware detection and version analysis | Creating a system restore point | Download, verify and install |
- Automatically scans for Intel chipset components
- Identifies specific Hardware IDs (HWIDs)
- Supports chipsets from Sandy Bridge to latest generations
- Detects both Consumer and Server platforms
- SHA-256 Hash Verification for all downloads
- Digital Signature Validation (Intel Corporation certificates)
- Automated System Restore Points before installation
- Dual-Source Download with backup fallback
- Administrator Privilege Enforcement
- No installation required - fully portable
- Automatic version checking and updates
- Clean, intuitive user interface
- Detailed logging and debug mode
- Save to Downloads folder option
- Mainstream Desktop/Mobile platforms
- Workstation/Enthusiast systems
- Xeon/Server platforms
- Atom/Low-Power devices
| Component | Minimum | Recommended | Notes |
|---|---|---|---|
| Windows Version | 10 1809 (17763) | 11 22H2+ | 1809 requires .NET 4.7.2+ |
| .NET Framework | 4.7.2 | 4.8+ | Required for TLS 1.2 support |
| PowerShell | 5.1 | 5.1+ | Windows PowerShell 5.1 included |
| Administrator | Required | Required | For driver installation |
| Internet | Required | Required | For hash verification and updates |
| RAM | 2 GB | 4 GB+ | For INF extraction/installation |
| Disk Space | 500 MB | 1 GB+ | Temporary files during installation |
| System Restore | Optional | Enabled | Automatic restore point creation |
| Version | Build | Status | Notes |
|---|---|---|---|
| Windows 11 | All builds | β Full | Optimized support |
| Windows 10 | 22H2+ | β Full | Recommended |
| Windows 10 | 21H2 | β Full | Stable |
| Windows 10 | 21H1 (19043) | β Full | Legacy |
| Windows 10 | 20H2 (19042) | β Full | Legacy |
| Windows 10 | 2004 (19041) | β Full | Legacy |
| Windows 10 | 1909 (18363) | β Full | Legacy |
| Windows 10 | 1903 (18362) | β Full | Legacy |
| Windows 10 | 1809 (17763) | β Limited | Requires .NET 4.7.2+ for TLS 1.2 support |
| Windows 10 | LTSB 2016 (1607) | Manual updates required for TLS 1.2 | |
| Windows 10 | LTSB 2015 (1507) | Manual updates required for TLS 1.2 |
- Windows 10 1809 (17763) and newer: Full TLS 1.2 support out-of-the-box
- Windows 10 LTSB 2015/2016: May require manual installation of:
- .NET Framework 4.8
- KB4474419 (SHA-2 update)
- The tool automatically:
- Detects Windows version limitations
- Warns about potential connectivity issues
- Provides fallback options for offline operation
- Basic INF detection and installation works even without internet connectivity
| Feature | This Tool | Intel DSA | Manual Installation |
|---|---|---|---|
| Automatic Detection | β Full | β Partial | β Manual |
| Security Verification | β Multi-layer | β Basic | β None |
| System Restore Points | β Automatic | β None | β Manual |
| Update Notifications | β Built-in | β Yes | β None |
| Self-updating | β Yes | β No | β No |
| Portable | β No install | β Requires install | β /β Varies |
| Free | β 100% | β Yes | β Yes |
# Download and run executable file as Administrator:
ChipsetUpdater-2026.03.0012-Win10-Win11.exe (or later version)# Run PowerShell as Administrator, then:
.\universal-intel-chipset-device-updater.ps1# For diagnostic purposes:
.\Intel-Platform-Scanner.ps1# Install from PowerShell Gallery (Run PowerShell as Administrator):
Install-Script universal-intel-chipset-device-updater
universal-intel-chipset-device-updater.ps1| Option | Description |
|---|---|
-help, -? |
Display help and exit. |
-version, -v |
Display the tool version and exit. |
-auto, -a |
Automatically answer all prompts with Yes β no user interaction required. |
-quiet, -q |
Run in completely silent mode (no console window). Implies -auto and hides the PowerShell window. |
-beta |
Use beta database for new hardware testing (available from version 2026.03.0013). |
-debug, -d |
Enable debug output. |
-skipverify, -s |
Skip the script self-hash verification. Use only for testing! |
Notes:
- These options work when the script is executed directly via PowerShell or via the SFX package.
- For fully unattended deployments (e.g., Intune, SCCM), combine
-quietwith administrator privileges.
Examples:
.\universal-intel-chipset-device-updater.ps1 -auto
.\universal-intel-chipset-device-updater.ps1 -quiet
.\universal-intel-chipset-device-updater.ps1 -debug -skipverify- Integrity Verification - Validates script hash against GitHub release
- Update Detection - Compares current version with latest available
- Security First - Ensures tool hasn't been modified or corrupted
- Scans PCI devices for Intel Vendor ID (8086)
- Identifies chipset-related components
- Extracts Hardware IDs and current driver versions
- Downloads latest INF database from GitHub
- Matches detected HWIDs with compatible packages
- Compares current vs latest versions
- Creates system restore point automatically
- Downloads from primary/backup sources
- Verifies SHA-256 hashes
- Validates Intel digital signatures
- Executes official Intel setup with safe parameters
- Provides real-time progress feedback
- Automatic cleanup of temporary files
1. Self-Integrity β Script Hash Verification
2. File Integrity β SHA-256 Hash Verification
3. Authenticity β Intel Digital Signatures
4. Project Origin β SFX signed with self-signed certificate (commercial Code Signing cert planned β community funding welcome)
5. System Safety β Automated Restore Points
6. Source Reliability β Dual Download Sources
7. Privilege Control β Admin Rights Enforcement
8. Update Safety β Version Verification
- Keep system updated without technical knowledge
- Automatic safety checks prevent installation issues
- One-click operation with clear prompts
- Batch deployment across multiple systems
- Comprehensive logging for troubleshooting
- Security verification for corporate environments
- Pre-installation preparation for new builds
- Driver consistency across multiple systems
- Time-saving automation vs manual updates
- File:
ChipsetUpdater-202x.xx.xxxx-Win10-Win11.exe - Features: Digital signature, one-click execution, automatic extraction
- For: Most users, easiest method
- File:
universal-intel-chipset-updater.ps1 - Features: Full control, modifiable code, transparency
- For: Advanced users, administrators, customization
- Method:
git clonethe repository - Features: Latest development version, full customization
- For: Developers, contributors
Key Files and Directories:
src/ - Main scripts directory
- get-intel-hwids.bat - Intel Chipset HWIDs Detection Tool Batch launcher
- get-intel-hwids.ps1 - Intel Chipset HWIDs Detection Tool PowerShell script
- uninstall-intel-chipset.bat - Intel Chipset Device Software Uninstaller Batch launcher
- uninstall-intel-chipset.ps1 - Intel Chipset Device Software Uninstaller PowerShell script
- universal-intel-chipset-device-updater.ps1 - Main PowerShell script
- universal-intel-chipset-device-updater.ver - Main Version file
- universal-intel-chipset-updater.bat - Batch launcher (deprecated since v2026.03.0011 β kept for reference only)
- universal-intel-chipset-updater.ps1 - Old PowerShell script (deprecated since v2026.03.0011 β kept for reference only)
- universal-intel-chipset-updater.ver - Old Version file (deprecated since v2026.03.0011 β kept for reference only)
data/ - Data files
- intel-chipset-infs-beta.md - Beta INF database
- intel-chipset-infs-dev.md - Development INF database
- intel-chipset-infs-latest.md - Latest stable INF database
- intel-chipset-infs-download.txt - Download links
- intel-chipset-infs-message.txt - Dynamic support message displayed at the end of the script (loaded from GitHub at runtime)
docs/ - Documentation
- BEHIND-THE-PROJECT_EN.md - Project background (English)
- BEHIND-THE-PROJECT_PL.md - Project background (Polish)
- HOW-TO-VERIFY-INF_EN_2026.md - Manual INF version verification guide (English)
- HOW-TO-VERIFY-INF_PL_2026.md - Manual INF version verification guide (Polish)
- MDM-DEPLOYMENT-GUIDE_EN_2026.md - Deploying the Tool via MDM (English)
- MDM-DEPLOYMENT-GUIDE_PL_2026.md - Deploying the Tool via MDM (Polish)
- NEW-RELEASE-GUIDE_EN_2026.md - New Release Guide (English)
- NEW-RELEASE-GUIDE_PL_2026.md - New Release Guide (Polish)
- POWERSHELL-GALLERY-PUBLISHING_EN_2026.md - PowerShell Gallery Publishing Guide (English)
- POWERSHELL-GALLERY-PUBLISHING_EN_2026.md - PowerShell Gallery Publishing Guide (Polish)
- THE-WHOLE-TRUTH-ABOUT_EN_2026.md - In-depth Intel chipset software explanation (English)
- THE-WHOLE-TRUTH-ABOUT_PL_2026.md - In-depth Intel chipset software explanation (Polish)
docs/audit-reports-2025-11-21/ - Security audit reports (archive)
- 2025-11-21-CHATGPT-AUDIT.md
- 2025-11-21-CLAUDE-AUDIT.md
- 2025-11-21-COPILOT-AUDIT.md
- 2025-11-21-DEEPSEEK-AUDIT.md
- 2025-11-21-GEMINI-AUDIT.md
- 2025-11-21-GROK-AUDIT.md
docs/audit-reports-2026-02-01/ - Security audit reports (archive)
- 2026-02-01-CHATGPT-AUDIT.md
- 2026-02-01-CLAUDE-AUDIT.md
- 2026-02-01-COPILOT-AUDIT.md
- 2026-02-01-DEEPSEEK-AUDIT.md
- 2026-02-01-GEMINI-AUDIT.md
- 2026-02-01-GROK-AUDIT.md
docs/audit-reports-2026-03/ - Latest security audit reports
- 2026-03-11-CHATGPT-AUDIT.md
- 2026-03-11-CLAUDE-AUDIT.md
- 2026-03-11-COPILOT-AUDIT.md
- 2026-03-11-DEEPSEEK-AUDIT.md
- 2026-03-11-GEMINI-AUDIT.md
- 2026-03-11-GROK-AUDIT.md
assets/ - Screenshots
ISSUE_TEMPLATE/ - Issue templates
- bug_report.md - Bug report template
- config.yml - Issue templates configuration file
/ - Root directory files
- CHANGELOG.md - Project changelog
- CONTRIBUTING.md - Contribution guidelines
- KNOWN_ISSUES.md - Known issues and workarounds
- LICENSE - MIT License
- PULL_REQUEST_TEMPLATE.md - Pull request template
- README.md - Main project documentation
- SECURITY.md - Security policy
- SECURITY-AUDITS.md - Comprehensive security audits summary
Each version (v202x.xx.xxxx) includes:
ChipsetUpdater-202x.xx.xxxx-Win10-Win11.exe- Main executable (digitally signed)universal-intel-chipset-device-updater.ps1- PowerShell script
ChipsetUpdater-202x.xx.xxxx-Win10-Win11.sha256- EXE hashuniversal-intel-chipset-device-updater-202x.xx.xxxx-ps1.sha256- PS1 script hashFirstEver.tech.cer- Digital certificate
CHANGELOG.md- Version historySECURITY-AUDITS.md- Security reports
Yes! This tool has undergone comprehensive independent security audits by 6 different AI experts with an average score of 9.6/10. Multiple auditors confirmed it's the safest and most stable version ever released, suitable for daily use, corporate deployment, and technician toolkits.
Security measures include:
- Hash verification of all downloads
- Automatic system restore points before installation
- Official Intel drivers only from trusted sources
- Comprehensive pre-installation checks
This tool specifically updates chipset INF files. It does not update GPU, network, or other device drivers.
As with any system modification, there's a small risk of temporary system instability. The automated restore point minimizes this risk significantly.
Files are temporarily stored in %SystemRoot%\Temp\IntelChipset\ and automatically cleaned up after installation.
The tool creates a system restore point before making changes. You can also check detailed logs in the temp directory.
The tool compares your current version with the latest version on GitHub. If a newer version is available, it offers to download it directly to your Downloads folder with full verification.
Before execution, the tool calculates its own SHA-256 hash and compares it with the official hash from GitHub. This ensures the file hasn't been modified, corrupted, or tampered with.
The tool automatically checks for updates on each run and clearly notifies you if a newer version is available, with options to continue or update.
The FirstEver.tech certificate is self-signed. A commercial Code Signing certificate would eliminate the SmartScreen warning, but it isn't necessary here β the PowerShell script (universal-intel-chipset-updater.ps1) is the authoritative source of the tool. Its SHA-256 hash is published on GitHub and verified automatically on every run, providing the same level of integrity assurance as a paid certificate. The SFX executable is a convenience wrapper for end users; its contents are the same verified PS1 script.
| Generation | Code Name | Status | Notes |
|---|---|---|---|
| 12th-14th Gen | Alder/Raptor Lake | β Full | Latest support |
| 10th-11th Gen | Comet/Tiger Lake | β Full | Complete support |
| 8th-9th Gen | Coffee/Whiskey Lake | β Full | Stable support |
| 6th-7th Gen | Skylake/Kaby Lake | β Full | Mature support |
| 4th-5th Gen | Haswell/Broadwell | β Full | Legacy support |
| 2nd-3rd Gen | Sandy/Ivy Bridge | β Full | Extended support |
| Phase | Time | Description |
|---|---|---|
| Compatibility Pre-Check | 5β10 seconds | OS build, .NET Framework, TLS 1.2 availability, administrator privileges and GitHub connectivity verification |
| Verification & Update Check | 5β10 seconds | Self-integrity hash verification and updater version check |
| Hardware Detection | 10β25 seconds | Full system scan and Intel chipset device identification (HWID enumeration) |
| System Restore Point Creation | 30β60 seconds | Automatic creation of a Windows System Restore Point before applying any changes |
| Package Download & Verification | 5β10 seconds | Download and integrity verification of required Intel INF metadata packages |
| Installation | 60β120 seconds | INF file installation, registry updates and device reconfiguration |
Note: Times above are measured on typical SSD-equipped systems with a standard broadband connection. On slower HDD systems or limited internet connections, individual phases (especially System Restore Point creation and package download) may take significantly longer.
| Stage | Estimated Usage | Notes |
|---|---|---|
| SFX archive (download) | ~0.7 MB | Self-extracting EXE |
| Extracted script (PS1) | ~90 KB | Temporary working file |
| System Restore Point | 100β300 MB | Managed by Windows (shadow copy storage) |
| Downloaded Intel package | 2β10 MB | EXE or MSI, platform-dependent |
| Extracted package contents | 10β30 MB | Temporary extraction of INF files |
| Peak temporary disk usage | ~150β350 MB | During restore point creation and extraction |
| Persistent disk usage after completion | < 5 MB | Scripts and logs only |
Important notes:
- System Restore Point size is the dominant factor and depends on Windows configuration.
- All extracted installer files are automatically removed after completion.
- No drivers or binaries remain installed β only INF metadata.
| Component | Estimated Usage | Notes |
|---|---|---|
| PowerShell runtime | 40β80 MB | Script execution, parsing and hashing |
| INF parsing & HWID scan | 20β40 MB | Temporary in-memory data structures |
| Installer extraction (EXE/MSI) | 30β100 MB | Short peak during unpacking |
| Peak RAM usage | ~100β200 MB | Worst-case during package extraction |
Memory characteristics:
- RAM usage is short-lived and released immediately after each phase.
- No background services or resident processes.
- Safe even for systems with 2 GB RAM.
- Required free disk space: ~350 MB (safe upper bound)
- Typical disk usage: ~150β250 MB
- Peak RAM usage: ~100β200 MB
- Persistent footprint after exit: negligible
For current limitations and workarounds, please see: KNOWN_ISSUES.md
- Download latest release from Releases page
- Verify digital signature and hashes (optional but recommended)
- Run as Administrator for full system access
- Follow prompts - tool handles everything automatically
- Restart if prompted to complete installation
- Check file hashes match published SHA256 files
- Verify digital signature with included certificate
- Review security audit reports for confidence
- π Full Documentation
- π Report Issues
- π¬ Community Discussions
- π§ Troubleshooting Guide
- π Security Informationβ Back to top
We welcome contributions! Please feel free to submit pull requests, report bugs, or suggest new features.
Areas for Contribution:
- Additional hardware platform support
- Translation improvements
- Documentation enhancements
- Testing on various Windows versions
This project is licensed under the MIT License - see the LICENSE file for details.
- Intel Corporation for providing official driver packages
- Security researchers for independent audits
- Open source community for continuous improvement
- Beta testers for real-world validation
- Releases - Download latest version
- Security Audits - Full audit history
- Issue Tracker - Report problems
Marcin Grygiel aka FirstEver
- π Website: www.firstever.tech
- πΌ LinkedIn: Marcin Grygiel
- π§ GitHub: FirstEverTech
- π§ Contact: Contact Form
This project is maintained in my free time. Your support helps cover development costs and server expenses.
Your support means everything! If this project helped you, please consider:
- If this project helped you, please give it a β star on GitHub
- Sharing with friends and colleagues
- Reporting issues or suggesting features
- Supporting development financially
Note: This tool is provided as-is for educational and convenience purposes. While we strive for accuracy, always verify critical INF updates through official channels. The complete HWID database is available for transparency and community contributions.




