By deployment Office preferred use authorized and reliable sources , with minimize danger installation fake and . Issue account Microsoft , if no . In compliance with this task email address and also access password . Upon completion installation proceed exploit Office and launching by launching any