There is no built-in mechanism in SSAS to restrict access based on the type of clients tool.
Off the top of my head I can think of a couple of potential solutions.
- You could talk to your networking team and get them to restrict access to SSAS. This would probably also restrict access to your team since usually these sorts of rules are setup based on fixed IP addresses and subnets and those sorts of things are usually only assigned to servers. Although for this to work you would need to have another SSAS server, for a dev environment where your team can connect to create/edit reports.
- If you are not using Row Level Security or Object Level Security in any of your models then you could possibly remove all end users (apart from your core team) from all security roles in your models. Then create one or more "service" accounts and put them in the roles and set the credentials for those in your Report Server data sources. This has the downside that anyone with access to the report can run it so you need to be more careful about the security in the Report Server layer. But this would block ad-hoc connections for most users while being able to maintain it for your core team.