Does "documents anti-exploit" change any other registry entries, besides HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Office\*\Common\VBAOFF
Yes, except the above system-wide entries, in the actual version 4.0.0.0 on Administrator type of account, there are many other registry entries for hardening MS Office. They are related to the below registry keys (non-system-wide, the asterisk means the version 12.0, 14.0, 15.0, 16.0):
HKCU\Software\Microsoft\Office\*\Word\Security
HKCU\Software\Microsoft\Office\*\Word\Options
HKCU\Software\Microsoft\Office\*\Word\Options\WordMail
HKCU\Software\Microsoft\Office\*\Excel\Security
HKCU\Software\Microsoft\Office\*\Excel\Options
HKCU\Software\Microsoft\Office\*\PowerPoint\Security
HKCU\Software\Microsoft\Office\*\OneNote\Options
HKCU\Software\Microsoft\Office\Common\Security
There are also many entries (system-wide and non-system-wide for Adobe Acrobat Reader XI and DC).
But for MS Office on SUA, only the system-wide VBAOFF entry is applied.
In the new version 4.0.0.1 the system-wide entries will be configured by Hard_Configurator, and those entries for MS Office and Adobe Acrobat Reader XI/DC can be supported by WD ASR rules (also system wide) and default-deny SRP to apply the strong security against weaponized documents opened by MS Office and Adobe Acrobat Reader XI/DC.
If one cannot apply ASR then it is possible to use DocumentsAntiExploit tool (from SwitchDefaultDeny application) to apply the above and some additional entries in HKCU Hive. They are not system wide, so the settings can be different on different accounts.